Hardware Kill Switch
   HOME

TheInfoList



OR:

A security switch is a hardware device designed to protect
computers A computer is a machine that can be programmed to automatically carry out sequences of arithmetic or logical operations ('' computation''). Modern digital electronic computers can perform generic sets of operations known as ''programs'', ...
,
laptops A laptop computer or notebook computer, also known as a laptop or notebook, is a small, portable personal computer (PC). Laptops typically have a clamshell form factor with a flat-panel screen on the inside of the upper lid and an alpha ...
,
smartphones A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as mult ...
and similar devices from unauthorized access or operation, distinct from a
virtual security switch A virtual security switch is a software Ethernet switch with embedded security controls within it that runs within virtual environments such as VMware vSphere, Citrix XenDesktop, Microsoft Hyper-V and Virtual Iron. The primary purpose of a vi ...
which offers
software Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications. The history of software is closely tied to the development of digital comput ...
protection. Security switches should be operated by an
authorized Authorization or authorisation (see American and British English spelling differences#-ise, -ize (-isation, -ization), spelling differences), in information security, computer security and identity management, IAM (Identity and Access Managemen ...
user only; for this reason, it should be isolated from other devices, in order to prevent unauthorized access, and it should not be possible to bypass it, in order to prevent malicious manipulation. The primary purpose of a security switch is to provide protection against
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as ...
,
eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eave ...
,
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
,
spyware Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
, and theft of digital devices. Unlike other protections or techniques, a security switch can provide protection even if security has already been breached, since it does not have any access from other components and is not accessible by software. It can additionally disconnect or block peripheral devices, and perform " man in the middle" operations. A security switch can be used for
human presence detection Human presence detection is a range of technologies and methods for detecting the presence of a human body in an area of interest (AOI), or verification that computer, smartphone (or other device controlled by software) is operated by human. Sof ...
since it can only be initiated by a human operator. It can also be used as a
firewall Firewall may refer to: * Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts * Firewall (construction), a barrier inside a building, designed to limit the spre ...
.


Types


Hardware kill switch

A hardware kill switch (HKS) is a physical switch that cuts the signal or power line to the device or disable the chip running them.


Examples

* A cellphone is compromised by malicious software, and the device initiates video and audio recording. When the user activates the “prevent capture of audio/video” mode of the security switch, that either physically disconnects or cut the power to the microphone and the camera, which stops the recording. * A laptop that has an embedded security switch is stolen. The security switch detects a lack of communication from a specific external source for 12 hours, and responds by disconnecting the screen, keyboard and other key components, rendering the laptop useless, with no possibility of recovery, even with a full format. * A user wishes to prevent tracking of their location. The user then activates
geolocation Geopositioning is the process of determining or estimating the geographic position of an object or a person. Geopositioning yields a set of Geographic coordinate system, geographic coordinates (such as latitude and longitude) in a given map datum ...
protection and the security switch disables all
GPS The Global Positioning System (GPS) is a satellite-based hyperbolic navigation system owned by the United States Space Force and operated by Mission Delta 31. It is one of the global navigation satellite systems (GNSS) that provide geol ...
communication, eliminating the possibility of tracking the device's location. * A user desires to eliminate the possibility of their PIN being copied from their smartphone. They can activate the secure input function, causing the security switch to disconnect the touch screen from the
operating system An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ...
, so input signals are not available to any devices except the switch. * A security switch performs scheduled monitoring and finds that a program is attempting to download malicious content from the internet. It then activates internet security function and disables internet access, interrupting the download. * If laptop software is compromised by
air-gap malware Air-gap malware is malware that is designed to defeat the air-gap isolation of secure computer systems using various air-gap covert channels. Operation Because most modern computers, especially laptops, have built-in microphones and speakers, air- ...
, the user may activate the security switch and disconnect the speaker and microphone, so it can not establish communication with the device.


History

Google Google LLC (, ) is an American multinational corporation and technology company focusing on online advertising, search engine technology, cloud computing, computer software, quantum computing, e-commerce, consumer electronics, and artificial ...
started to work on a hardware kill switch for AI in 2016. In 2019,
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
, and Google, along with a handful of smaller players, are designing “kill switches” that cut the power to the microphones or cameras in their devices. Googles first product that implemented this is
Nest Hub Max Google Nest, previously named Google Home, is a line of smart speakers developed by Google under the Google Nest brand. The devices enable users to speak voice commands to interact with services through Google Assistant, the company's virtual ...
. Hardware kill switches are already available and widely tested on the
PinePhone The PinePhone is a smartphone developed by Hong Kong–based computer manufacturer Pine64, designed to provide users with full control over the device. This is achieved through the utilization of mainline Linux-based mobile operating systems, ass ...
,
Librem Librem is a line of computers manufactured by Purism, SPC featuring free (libre) software. The laptop line is designed to protect privacy and freedom by providing no non-free (proprietary) software in the operating system or kernel, avoiding t ...
,
Shiftphone Shiftphone is a modular, easy-to-repair smartphone brand created by the company SHIFT in Germany. The company emphasizes fair trade and ecology, similar to Fairphone. Instead of tantalum capacitors made from coltan, ceramic capacitors are u ...
, to cut power to the input peripherals (microphone, camera) but also the network connectivity modules (wifi, cellular network).


References


External links

* Apple's T2 Security Chip Makes It Harder to Tap MacBook Mics, WIRED  https://www.wired.com/story/apple-t2-security-chip-macbook-microphone/ * The hardware trend Google and Apple are throwing their weight behind, Fast Company, 2019 https://www.fastcompany.com/90349731/the-hardware-trend-google-amazon-and-apple-are-throwing-their-weight-behind


See also

* * * * {{annotated link, Air-gap malware Computer security