• Unleaded8163@fedia.io
      link
      fedilink
      arrow-up
      8
      ·
      22 hours ago

      You could probably install a handler for the event that’s triggered when the power button is pressed. Most OSes do that and pop up a graceful shutdown options window. Most hardware will have a hard shutdown option when you hold the power button for a few seconds. You would probably have to overwrite the BIOS or something at that level to prevent that way out.

      • esc@piefed.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        21 hours ago

        alt+sysrq+b bypasses this handler, also switching to another vt should just drop you in a normal shell it as well as long the login shell isn’t modified. There are a lot of ways that can be used to break out.

    • ChaoticNeutralCzech@feddit.org
      link
      fedilink
      English
      arrow-up
      4
      ·
      21 hours ago

      Encrypt hard drive and keep the key in RAM. Could be recovered with a cold boot attack but that’s very advanced. The DOS virus ONEHALF would run as a daemon encrypring a block on the drive on each boot and intercept reads/writes to the encrypted part as if nothing ever happened. Only after encrypting ½ of the disk, it would reveal itself with an ominous

      Dis is one half.
      Press any key to continue...
      

      The decryption was eventually cracked by ESET and they developed a tool to recover the drive.