top of page

VeroGuard

Systems

The Spring Onion Hack: Why Your PC’s Security Might Be a Joke.

  • Aug 14
  • 3 min read

In a bizarre twist that sounds more like satire than cybersecurity research, it was recently demonstrated that a spring onion (yes the vegetable!) could be used to bypass security on Dell devices by exploiting firmware vulnerabilities. This isn’t just a quirky headline – it’s a serious wake-up call for anyone relying on built-in device security like TPMs or biometrics.


ree

What Happened?

The vulnerability, as reported by Computer Weekly, involves flaws in Dell’s firmware that could allow an attacker to bypass secure boot mechanisms. The researchers showed that even with a Trusted Platform Module (TPM) present, the system could be compromised using physical access and “clever manipulation” - like using a vegetable to trigger capacitive sensors – highlighting how superficial some security implementations can be.


The Problem: Trusting the Wrong Hardware

The Dell vulnerability highlights that fundamental flaws in modern device security can occur even when a PC has a secure element like a TPM, it’s not truly secure if the firmware can be tampered with. In general, these devices lack tamper-resistance, meaning attackers can gain physical access to probe secure circuits and manipulate them to reveal their secrets.

And then there’s biometrics. The “Spring Onion Hack” shows how biometric authentication can be spoofed or bypassed. Once considered cutting-edge, biometrics are now continually proving to be inherently insecure when used as the sole method of authentication.


The Limitations of TPM and Biometrics


TPM: Not a Silver Bullet

  • TPMs are embedded in general-purpose devices and rely on firmware integrity.

  • If the firmware is compromised, the TPM can be rendered ineffective.

  • TPMs lack physical tamper resistance in most consumer devices.


Biometrics: Convenient but Insecure

  • Biometric data is not secret.

  • Can be spoofed and bypassed.

  • The “Spring Onion Hack” shows how easily sensors can be tricked.


The VeroGuard Solution: Security by Design

At VeroGuard, we believe security should be purpose-built, not patched together from consumer-grade components. Here’s how our solution addresses the issues exposed by the Dell incident:


Purpose-Built Hardware Authenticator

VeroGuard uses a dedicated hardware authenticator that is designed from the ground up for secure identity verification. The VeroCard is dedicated solely to identity-based functions. It has no physical ports for external connections and cannot be remotely activated, ensuring it remains isolated and secure from unauthorised access.

 

Tamper Resistance Is Non-Negotiable 

Security that can be physically bypassed isn’t security at all. VeroGuard’s authenticator is engineered with true tamper resistance and certified to payment industry specifications, ensuring that even if an attacker has physical access, they can’t compromise the device or the credentials it protects.


No Biometrics, No Guesswork

We don’t rely on biometrics. Why? Because;

1)        they’re not secret, and

2)        they’re probabilistic and not deterministic.

Biometric authentication systems are intentionally designed to tolerate slight variations in input, because no two biometric scans – even from the same person – are ever exactly identical. Ironically, a 100% match is often treated as suspicious, since it may indicate a replay attack using a previously captured biometric sample.

VeroGuard uses cryptographic keys stored in secure hardware.


Out-of-Band Authentication

Most importantly, VeroGuard’s authentication process occurs outside the target device. This out-of-band approach means that even if the PC or phone is compromised, the authentication remains secure. The device never sees your credentials, making phishing and malware attacks highly ineffective.

 

Final Thoughts: Don’t Let Your Security Be a Joke

The spring onion hack is amusing—until you realise it could happen to your business. It’s time to stop trusting consumer-grade security and start demanding real protection. VeroGuard offers a solution that is not just secure in theory, but secure by design.

  • Dedicated hardware designed specifically for secure identity verification.

  • Purpose built for authentication – NOT general-purpose use

  • Out of Band – Authentication occurs outside the target device.

  • Hardware Security Modules – Credentials are never exposed to the device, reducing phishing and malware risks.

  • Engineered with true tamper-resistance – keys are wiped if tamper is detected

 

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page