Would you look at that. Actual security. So difficult

Would you look at that. Actual security. So difficult.

Other urls found in this thread:

resources.infosecinstitute.com/hacking-air-gapped-networks/
wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/
newscientist.com/blog/technology/2007/04/seeing-through-walls.html
arstechnica.com/security/2014/11/researchers-bridge-air-gap-by-turning-monitors-into-fm-radios/
twitter.com/AnonBabble

>implying the cia won't plug it back in

Military grade technology can enter any PC with wifi card, on/off, doesn't matter

>HDD indicator blinks the actual bytes being written/read
>Speakers can transmit data at a high frequency
>Intel Management Engine

There's still ways

What about WiFi/Bluetooth?

>implying your processor isn't backdoored with wake-on-3g

>implying the cia won't use the coils of you momboard and make a mini wifi then spy all your shit with the windows kernel

Remove the wifi card.

Buy some more tinfoil.

>he doesn't know about Van Eck Phreaking!!!

Hahahaha wtf and you're on a technology board.

kys

>Military grade technology can enter any PC with wifi card, on/off, doesn't matter

How?

Buy one of these.

resources.infosecinstitute.com/hacking-air-gapped-networks/ lel

I'll take the keyboard.

Luckily, those are targeted attacks. If those are being launched against you, then you're fucked already.

Then you shouldn't even care about botnets

wowie

>he doesn't know about Faraday cages

no u kys

All of those require you to be infected with specific malware though.

>not taking the machine
Model M is what? $150 ? That case alone costs $300. Its contents - if well preserved - can go up to $5000 or more with rare hardware.

If a nation state wants to hack, you're fucked. There isn't one person on this board that could prevent that.

Because the military officer installs it via usb while you are out

Make sure you don't stick any usb sticks or cds in there either, bud.

>Imblygin the NSA doesn't have an exploit for your power supply that transfers the logged data via the grid

microphone.

there's a huge difference between some possibilities existing to spy on you when they try really hard or just giving everyone your data before they even asked for it so they can look 10 years back into your life and sell the info to the highest bidder

>HDD indicator blinks the actual bytes being written/read

If you're referring to this : wired.com/2017/02/malware-sends-stolen-data-drone-just-pcs-blinking-led/

Then no, it's not until you infect the host.

>Speakers can transmit data at a high frequency
Sauce ? I'm sure it requires infection as well.

>Intel Management Engine
Without any network link, I doubt it would harm.

However you're right, they are still ways, like seeing your monitor screen through walls :
newscientist.com/blog/technology/2007/04/seeing-through-walls.html

>Implying three letter agencys can't jump air gaps.

Modern intel chips can be accessed via cell networks. Chips transmit a radio frequency at close range, sensitive equipment can pick it up farther away. The radiation from screens can picked up through walls. The noise your fan makes can be modulated to transmit data, HDD access noises as well. These are just what has been leaked, and they're pretty comprehensive.

If any are used, that means you've been individually noticed, and you're fucked.

Temple OS in a Faraday cage.

Israeli security firms used a systems graphics card to transmit data over fm freqencies. The same was done with monitors

arstechnica.com/security/2014/11/researchers-bridge-air-gap-by-turning-monitors-into-fm-radios/

Air gapped systems can be compromised.

>The technique, called AirHopper, assumes that an attacker has already compromised the targeted system and desires to occasionally sneak out sensitive or classified data.

That's still require infection of the host. It just uses the graphic card/ cpu fan/ hdd/ hdd led/ webcam led/ keyboard led/ speakers/ ... as a an emitter.

Right, just like how stuxnet was able to penetrate Iranian nuclear computers that were airgapped. Essentially never plug anything into your airgapped system, never connect to the internet, and sit inside a Faraday cage. What exactly is a computer that's closed off to all connectivity useful for?

Awww that poor computer is sick!

I guess you're right, the use is limited. I just wanted to point out those methods are not "that easy" to deploy since they are not solely relying on hardware devices, but also on the good propagation of a malware. However, nothing prevent such a malwares to be already on every machine we own...

Bluetooth technology is not long range. Unless you're literally getting v& it's not possible.

Also, opensource firewall with permissions off over a LAN cable would still be safe.

ITT

>$5000
Hell no, that's the kind of money you'd dump on a nice mainframe or a museum-quality rarity like a loaded RT PC, it's more like $500 if it's loaded, pristine and with a ton of accessories on top of it. Model Ms aren't worth that much either, if you pay over $30 for one you're autistic.

I'm still with you though, fuck keyboard hipsters, I'd kill for a good microchannel flagship and the thought of even just a few of them getting trashed so some poser faggot chasing trends could make off with the gay ass loud keyboard they made billions of makes my blood boil.

Only on Intel brand power supplies. AMD power supplies are unhackable.

LOL !

In all serious user it would just keep collecting and dump it's report as soon as you connected.