Physical Security

tag: [Security Specialist, Operations & Strategy]

Physical security is an often overlooked but crucial aspect of operational security, especially for individuals and organizations involved in cryptocurrency. This section provides guidelines on how to protect yourself, your digital assets, and your organization from physical threats and attacks.

Best Practices

  1. Random USB storage devices should not be plugged into your devices. Dropping malicious USB sticks and hoping for someone to pick them up and insert them into their computer is a real threat. On the subject of USB, do not plug in your device into an untrusted charger (e.g., on a bus or airplane) without a data blocker.
  2. Do not click on links from untrusted sources, as they may lead to malicious websites or legitimate websites that have been compromised. In the event that you’re asked to take action on a website through, for example, email, visit the website manually (e.g., discord.com) rather than clicking the link.
  3. Avoid scanning QR codes as they could potentially contain exploits.
  4. Be wary of websites pushing pop-ups that make it seem that you need to install software to upgrade or secure your computer, these are often malware.
  5. If you receive a suspicious message, try reaching out to the person via a different channel.

Secure Traveling

Preparation

  1. Travel with the minimum number of devices necessary. Leave non-essential devices at home.
  2. Backup all important data before traveling. Store backups in secure, separate locations.
  3. Remove sensitive data from devices before traveling. Consider using travel-specific devices with minimal data depending on the country you're visiting.

During Travel

  1. Keep your devices with you at all times. Use secure storage options when necessary.
  2. Avoid using public Wi-Fi networks. If necessary, use a VPN to secure your connection.
  3. Avoid using untrusted charging stations. Use a USB data blocker or carry a portable charger.

Border Security

  1. Encrypt your devices to protect data in case they are inspected or seized.
  2. Carry minimal data across borders. Be aware that some countries may require decryption of devices.
  3. Be prepared for device inspections. Consider using travel-specific accounts and removing sensitive information.

Preventing "Wrench Attacks"

A "wrench attack" refers to the scenario where an attacker uses physical force or coercion to gain access to your assets.

Mitigation Strategies

  1. Use multi-signature wallets that require multiple parties to authorize transactions.
  2. Distribute parts of cryptographic keys among trusted individuals or locations.
  3. Use decoy wallets with small amounts of cryptocurrency to satisfy attackers without compromising significant assets.
  4. Establish clear policies for responding to physical threats in your project, including non-compliance and emergency contacts.

Home Security

  1. Use strong locks, security doors, and window bars to prevent unauthorized entry.
  2. Install security cameras and alarm systems. Monitor the premises regularly.
  3. Use safes or locked cabinets to store devices and sensitive documents.

Device Protection

Hardware Security

  1. Use laptop locks and secure your devices to immovable objects when in public or shared spaces.
  2. Use tamper-evident seals on devices to detect unauthorized access attempts.
  3. Regularly check devices for signs of tampering or unauthorized access.

Environmental Considerations

  1. Protect hardware wallets or other devices from extreme temperatures, humidity, and physical shocks.
  2. Store hardware wallets or other important devices in fire-resistant safes and ensure that your environment has appropriate fire detection and suppression systems.

Emergency Contacts

Maintain a list of emergency contacts, including law enforcement, cybersecurity experts, and team contacts.