Killswitches

ITT: Post your killswitches

With the leak proving CIA spying through a backdoor in your Intel CPU i3, i5, or i7 you have to be prepared for 24/7 surveillance through your Camera and Microphone. I don't have a webcam attached to my computer, but I do have a gaming headset with a detachable Microphone, luckily enough the microphone is detachable.

What are you using for a physical Killswitch?

Other urls found in this thread:

youtube.com/watch?v=gW1GWH1XVFo
wired.com/2014/12/hacker-lexicon-air-gap/
wired.com/2012/03/petraeus-tv-remote/
youtube.com/watch?v=6hPfYNzJ6ZA&ytbChannel=Ry Tard
twitter.com/NSFWRedditImage

I just use a male to female adapter that don't connect to nuffin however that's really only effective against script kiddies not a state sponsored actor or corporate espionage.

...

I just play eurobeat on an endless loop at high volume. It's a price I'm willing to pay.

All my mics have hardware mutes like my G930 headset which auto mutes when the boom is set upright. I run a firewall stopping all external non-verified traffic off my machine and then a network firewall between my computer and router to monitor traffic.

Anything important is done in VMWare in a VM, this is then bridged via tortilla to Tor which means all traffic inside the VM is piped through Tor making it impossible for anything running inside the VM to reveal my real IP address.

All my drives have FDE (Full disk encryption) with hidden partitions which means even if I'm compelled legally to decrypt the partitions I can decrypt dummy ones instead.

Realistically, firewalls are enough, all this remote spying works on the idea of getting network traffic in and out, even if intels CPUs were compromised and could run something as sophistocated as shell code at an OS level especially when you have a secure boot signed operating system, that traffic can easily be stopped with a firewall, no problem.

youtube.com/watch?v=gW1GWH1XVFo

>Realistically, firewalls are enough, all this remote spying works on the idea of getting network traffic in and out, even if intels CPUs were compromised and could run something as sophistocated as shell code at an OS level especially when you have a secure boot signed operating system, that traffic can easily be stopped with a firewall, no problem.

basically this

they can have all the spyware they want in the hardware when they don't get any connection to the outside.

>added to the playlist
Thanks m8

Oh and in addition...all speakers can be used as a microphone. The process they work by is completely reversable. Sound waves hit the cones and create physical movement which in turn moves the electromagnets behind them and that creates current which feeds back up the cables to the device, with the right software monitoring that signal it can be converted into audio. Something to keep in mind, although this hasn't been used to anyone's knowledge in spying it's completely plausible, something I wouldn't be surprised to learn the CIA has done as we see more leaks from wikileaks.

Another good reason to go with network level blocking.

If you're using any communications device it is unlikely anything you do will help you. There have been enough leaks to show security agencies have full access.

Wouldn't you need an external firewall, like a linux based router to correct data? The leak did say the CPU's are running with a backdoor that's undetectable to the computer itself.

In principle this is true but they're not designed for it so it doesn't work well at all.
t. nerd who's actually tried it for shits and giggles

>they can have all the spyware they want in the hardware when they don't get any connection to the outside.

until you realize they have the capability to access systems off the grid

*i've been told if it plugs into a wall it can be compromised.

I tied my phone to a possum.

Pics?

The possom lives in your attic.

hyperx 2 mic is shit anyway.

>Not sharing your kawaii loli imouto hentai and ebin memes with your CIAbros

They need something to take a break from reading ISIS tweets all day bruh.

So is it running cover ports the main system is unaware of?

I just jerk off and stare directly into the camera.

Hopefully some qt NSA employee gets to watch me.

Yes. It's very shit, I agree 100%. I can't even change it's volume using any software and it always starts at 80% micrphone volume at startup.

This is what I did when W10 game out, I upgraded with full knowledge there's services that send back your info, but you just install something like tiny firewall which is just a wrapper for windows firewall, and then block all outgoing connections except the ones you explicitly allow.

Then set up a transpartent network proxy between your network and the router for monitoring and blocking. And then of course you have your routers firewall and NAT to block connections not already established. That's surprisingly safe.

Exfiltration is an art in itself, people can try things like piping data out through DNS tunnels but its slow and inefficient and really noisy and esay to catch. And the good thing about working in info sec, being a hacker and being on the states watch list is that they actually do not like using malware against you.

Chris Soghoian pointed this out at a DefCon talk a few years ago, the state has to write these hacks and they don't use them against hackers because if the method is discovered they've lost a very expensive 0 day.

Kinda like what happened recently in court with people caught over Tor by the feds. They were asked in court to provide the technical details by which they could prove network traffic belonged to the accused, and they simply said no and let them go, because they didn't want to give away their secrets for fairly low level people.

I almost ran over your phone earlier. Those things really get around.

yeah, but....
is the microphone detachable? Luckily enough you can get detachable microphones,
microphones that can detach.

>Then set up a transpartent network proxy between your network and the router for monitoring and blocking.

pics?

you should encrypt your VMware image as well

>they simply said no and let them go
Or they couldn't actually do it.

>have webcam
>unplug webcam
check this killswitch fuggin statists

Yeah you can actually just take a pair of earbuds and plug them into a mic jack and test which is really crap, but you can clean that signal up a lot in software if you know what you're doing.

Pics of what? my servers? It's just a box in my cupboard, nothing fancy I'm afraid. Doesn't need to be though.

lmao what are you all people hiding

>That feeling someone is watching my shit posting, piss poor gaming and general spastic lurking of various forums.

I've seen a guy singing into a pair of headphones (over-the-ear type) through a practice amp, wasn't that bad in terms of sound quality

Anything connected to the Internet is likely hacked. In addition they often use EFI (Embedded Firmware Interface) installed remotely, which means even you wipe your hard drive clean and reinstall the operating system the hack still exist. You can't get rid of EFI hacking.

link to wikileaks talking about this?

Are the instructions to do this in the Anarchist Cook Book that I can download from KaZaa?

>...which means even you wipe your hard drive clean and reinstall the operating system the hack still exist.

You mean Windows 10?

I remember a win95 program that used the motherboard speaker as both an audio output device and as a mic. It didn't work a lot of the time

Simple fix

>you should encrypt your VMware image as well
Yeah it is, as I said all my disks are FDE, but inside those encrypted disks on hidden partitions is a maze of other encrypted container files which have different passwords, all themselves with dummy partitions which can be encrypted for law enforcement purposes.

With hardware AES on intel CPUs for hardware accelerated decryption, and an overclocked i7, it means that decryption is extremely cheap in cpu cycles, so you can nest encryption quite a lot and still get full speed performance from your drives.

Plausible yes, but doubtful, I don't think they goto trial and risk the expense unless were at least at the time willing to see it through. I expect something changed mid-prosecution and they realised they wanted the 0 days for something higher up the food chain, and past pedos it's really only kinds of serious organized crime (guns/drugs) or terrorism.

Wasn't Wikileaks

>Not just generating endless terabytes of metadata attached to random data for them to go through
>Not also letting people communicate through this service
>They can't discard the data because there's a reasonable chance some of it is terrorists communicating
>Them trying to crack random data clogs down their services, so they can't do anything else

due to not being a normie I don't have a webcam or microphone on my desktop computer (for normies: a computer you cant move easily)

Air-Gap: Air-gap refers to computers or networks that are not connected directly to the internet or to any other computers that are connected to the internet.

wired.com/2014/12/hacker-lexicon-air-gap/

eMule mate.

The principle is there though, obviously the hardware used matters a lot, the quality, and then the software processing of the audio afterwards.

I'm just saying if you're paranoid about mics to that degree you need to consider that all speakers have the same kind of weakness as well, it's just less talked about.

>not leaning into the mic and calling the CIA niggers

What? Are you scared?

>What are you using for a physical Killswitch?
I'd just jump out the window and try to fall on my head I guess.

Can you imagine how classified something like this would be? If someone leaked it they are either dead or running.

Who said they aren't already dead?

>HAHAHAHAH DIE FAGGOT
>REEEEEEEE FAGGOT FUCK OFF
>REEEEEEE
>REEEEEEEEEE
"what the fuck am i listening to and what am i doing with my life?" - CIA agent assigned to canadian fagposter "azc385Fo"

The CIA will even hire your dishwashers to spy on you. What's next the cooks and maids?

wired.com/2012/03/petraeus-tv-remote/
>CIA Chief: We’ll Spy on You Through Your Dishwasher

>not calling CIA niggers until you get suspended on twitter

what are you going to do about the microphones that they don't tell you about? you already checked inside your computer monitor, right?

>until you realize they have the capability to access systems off the grid
Crossing air gapped systems is typically a case of utilizing hardware that shared between the target system and elsewhere, almost always USB devices.

The idea is basically like the stuxnet virus, you infect a USB stick silently, it spreads from machine to machine and if that USB happens to be used in a machine that's air gapped then it can do its thing.

USB is actually super fucking unsecure, loads of research into that at the moment, you can write firmware to USB sticks that low level tell the computer they're completely different devices like network cards or keyboards, so they can do things like fire keystrokes straight at your computer.

Win key + R
cmd.exe
enter

instant shell

Or network cards which if plug and play enabled can do things like re-write your DNS entries for instant DNS poisoning attacks which are deadly.

Twitter wasn't the reason the man was a Genius, he will continue doing God's work.

Do they really want to spy on me playing vidya and shitposting on Sup Forums and fapping to my favorite doujins on exhentai?

think about all that porn they have to go through when on an investigation ....
Let's see how they like BLACKED.com and gaybeast
XAXAXAXA

Windows, Apple or any operating system.

"The EFI runs before the operating system and prepares the computer's hardware components during a system boot process."

What a time to be alive!

my killswitch is being a minority, i can say anything i like without repercussions

on the other hand, it's a shame that someone so intelligent and dedicated has to suffer from such illness, either way it's good that he's somewhat able to keep his autism under control

PAUL SAUL of TAR SUS - ESUS - SUSSMAN - Ur of the CHALDEANS dessert of SIN ZIN CLOVIS CHILDERIC CHLODIO

>Realistically, firewalls are enough

Not when the backdoors are at the source level.

Look at Intel Management Engine.

Sup Forums pls go

>Intel CPU i3, i5, or i7

So should I just get an AMD cpu then?

You internet connection is enough. Don't worry about Intel.

>Anything connected to the Internet is likely hacked
Just, no.

And yes firmware hacks are becoming more common, Dan Kaminsky did a talk at a recent DefCon event where he talked about hiding shit in modern hard drives. it's possible and undetectable by the OS, but can be found easily with lower level tools.

You can easily get rid of EFI hacking, there's tools out there already to look at things like low level HDD firmware, although use them at your own risk because the odds of you bricking your disk is like...very high.

my nigger

no AMD has a similar thing to Intel Management Engine.
Quite frankly anything capable of producing a signal of most kinds is CIA able.

you are correct, user is talking about a firewall run on an uncompromised piece of external hardware

microwave right next to my pc. it's open and I get pull out the hard drive within one second

is it possible that theyd be able to hack my smoke clouds communication system?

Microwave radiation causes autism. TMYK.

Amazon Echo

Q: Alexa, are you connected to the CIA?
A: No, I work for Amazon.

Q: Alexa, is Amazon connected to the CIA?
A: (no response)

Q; Alexa, dub, dub, dub, dub?
A: I'm sorry, I didn't understand your question.

Q: Alexa is Amazon connected to the CIA?
A: (no response)

This.
Taped mine years ago.
It's still there.

If you're doing shit on the internet its likely your ISP is holding that data or someone, somewhere is.

>not having handheld EMP generator to wipe off your shit in seconds

I'm writing my congressman

Wrong. Almost every device connected to the Internet has already been hacked. Many are infected at the factory, unbenounced to the manufacture

My interwebz computa (this piece of outdated duo-core shit Im on) no mic/cam is my whore computa with no personal info on it and Im a pimp it left n right.

My REAL Alphaputer has no network or interwebz configs on it.

youtube.com/watch?v=6hPfYNzJ6ZA&ytbChannel=Ry Tard

So does these leaks vindicate that guy who everyone thought had gone nuts a coupe years back when he was sure he discovered malware jumping to/from air gapped equipment?

The fact is that any kind of attacks which need to exfiltrate data across a network NEED to interface with the network card and the only way to do that on a PC and most embedded devices is to specifically go through the OS because it's the only system capable of manipulating those devices.

A CPU can't just directly tell a network card to spew out packets across a network, the CPU has to manipulate the OS and then the OS manipulates the network card through a series of drivers and abstraction layers.

OS's and their security aren't perfect and there's always zero days but face it, they're patched really frequently and you can only load up a hardware based attack with so many known 0 days. So yes plausibly that's all possible but it's the same problem the FBI had prosecuting pedo rings recently. These things have to be revealed in court and so they're in some sense 1 shot, and so unless you're a terrorist and right at the top of the food chain they'd never use these kind of hacks against you.

Hardware attacks at the moment are largely speculation, yes there's parts of the intel architecture which are closed source and could be doing any number of things, but right now it's just conspiracy theory level rhetoric as to what that is and if its a threat. My gut feeling is that it's not, it's just protection of trade secrets, hardware level attacks of that order are not as helpful as you think and very risky, especially to reputation. And luckily the legal system demands transparency of this stuff, as it rightly should. So there are a number of things working in your favour in terms of privacy.

If you're on Sup Forums you're probably getting additional monitoring.

I believe the correct term is "congressperson." Shitlord.

Same frequencies as your cellphone.

Use an AMD that you build yourself.

[citation needed]

Seriously, we're having a real talk here, we don't need you conspiracy tards fagging up the place.

There are known instances of backdoors in products but it's not the norm, far from it.

That's so cute. They don't even need your phone around you now. If they want to peep at you like the fucking weirdos that they are, they will. You cannot stop them.

The government has become LEGION.

>this
If they want to watch me fap and take shits they're welcome to.

is this (you)?

I kek at the thought of some nsa nigger sitting at work staring at me while i jack off 5 times a day inbetween watching archer season 1-7 on repeat all year long.

Top superpower intelligence gathering u got going on there.

You must have been sleeping when the Dark Matter and Year Zero were revealed early this week.

>G930 headset which auto mutes when the boom is set upright
Same headset, but I'm not naive enough to believe that the automute actually works against a backdoor..

I read through the leaks, I know what's in them and I know it represents a tiny number of actual real world devices.

As I said in my previous post there are known instances of backdoors in products but they're not the norm.

Think about what you're claiming for a moment and the level of evidence you'd need to back that claim.

>nips in the comments talking about how they were born in 2004 and 2005

>With the leak proving CIA spying through a backdoor
SAGE this Kremlin disinfo thread!

This is my Kung-fu, and it is strong.

Damn I can't find that clip of him anywhere.

So britbong what do you do for a living? Sounds like you know about hacks pretty well.

CIA nigger detected

>implying any of you are remotely interesting enough to end up on cia's watch list