http://dys2pwwos5w5kez2chufdk3b3oyj5n4n4iiseyke2tzuqahgvmovloyd.onion/en/2021-12-tamper-evident-protection.html
The Intercept published a good article on supply chain attacks in 2019, Microsoft started its own series of articles that same year: Part 1 , Part 2 , and Part 3 . Evil Maid attacks If somebody has hardware access, an Evil Maid attack can be carried out within a few minutes . Whoever has access to the hardware can not only manipulate firmware and possibly software, but also replace or manipulate hardware and create images of storage media.