Glitter nail polish: The new way to protect your data
Glitter nail polish is the perfect way to ensuring your laptop hasn't been tampered with as its random pattern is extremely hard to replicate, experts say
Security experts have come up with a novel way to ensure your laptop or tablet hasn't been tampered with and your data compromised - glitter nail polish.
Physical tampering with devices to steal data, or install malware for monitoring purposes, is becoming an increasing problem, especially when travelling, where border officials can easily confiscate devices for ‘inspection’.
Problems with hardware interference and data theft have been particularly reported by business travellers to China. The UK government meanwhile has the right to suck all the data from a device and store it when people enter and leave the country.
Many people do fit tamper-proof seals over ports and screws, but these can easily be opened cleanly or replicated in minutes by anyone with minimal training, security researchers Eric Michaud and Ryan Lackey said, while presenting at the Chaos Communication Congress, reports Wired magazine.
The pair’s answer - create a seal that cannot be copied. Glitter nail polish is the perfect candidate for making the seal, the pair added, as a completely random pattern is created, unlike with standard paint or a sticker.
Once applied, a photo can be taken on a device such as a smartphone that will not leave your side - or can be left at home - to ensure the image has not been tampered with.
Taking a second picture once you’ve returned from a trip or become suspicious that your laptop has been meddled with, then running the two through a program that allow the two images to be rapidly switched between, will allow you to spot any differences if the glitter nail polish has been removed and repainted, Mr Michaud and Mr Lackey explained.
The technique is inspired by that used by astronomers to spot minute changes in the night sky.
In the next few months the pair plan release a cheap piece of software that will allow the images to be easily analysed, as well as enable a second step whereby a device cannot be connected to a company system - and potentially compromise it - until the images have been verified.
Life & Style blogs
Exclusive: We share blame for creating 'jihad generation', says Muslim strategist
Robin Williams Emmys tribute led by Billy Crystal criticised for including 'racist' joke about Muslim woman
The Rotherham child abuse scandal is a tale of apologists, misogyny and double standards
Scottish independence TV debate: Pumped-up Alex Salmond bounces back in bruising second round against Alistair Darling
Do you realise just how foolish the UK looks?
Ukip Douglas Carswell defection: Tory MP jumps ship to join Nigel Farage
- 1 Paul Scholes: Manchester City were so good against Liverpool I felt like turning the television off
- 2 Notting Hill Carnival: Woman shares selfie after being ‘punched in face for telling man to stop groping her’
- 3 Pamela Anderson rejects ice bucket challenge because of ALS experiments on animals: 'Mice had holes drilled into their skulls'
- 4 Homer Simpson takes the ALS ice bucket challenge because of course he does
- 5 Hello Kitty is not a cat after all
- < Previous
- Next >
iJobs Gadgets & Tech
£180 - £220 per day: Ashdown Group: Systems & Network Administrator (Windows, ...
£35000 - £40000 per annum + benefits: Ashdown Group: The Ashdown group has bee...
£45000 - £60000 Per Annum + benefits: Clearwater People Solutions Ltd: Scrum M...
£20000 - £30000 per annum + OTE £40,000: SThree: SThree Group have been well e...