Bitcoin Forum
November 06, 2024, 05:35:12 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 [4] 5 6 »  All
  Print  
Author Topic: The NSA is reportedly able to access offline computers thanks to radio wave tech  (Read 7616 times)
mgburks77
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
January 30, 2014, 06:09:24 PM
 #61

that means that they can watch you wacking off to the porn on your computer even when the wifi is turned off...lol

Yeah, but so far inflatable dolls are safe from the NSA...
http://www.dupont.com/products-and-services/electronic-electrical-materials/flexible-rigidflex-circuit-materials/brands/pyralux-flexible-circuit.html

more to worry
with this technology they could access even that
benjamindees
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


View Profile
February 20, 2014, 02:26:07 AM
 #62

Intel CEO tells Reddit to "Ask Me Anything," fails to answer two top-voted questions about hardware backdoors in CPUs:

http://www.reddit.com/r/IAmA/comments/1ycs5l/hi_reddit_im_brian_krzanich_ceo_of_intel_ask_me/

Civil Liberty Through Complex Mathematics
Hazir
Legendary
*
Offline Offline

Activity: 1596
Merit: 1005


★Nitrogensports.eu★


View Profile
February 20, 2014, 03:13:38 AM
 #63

If you think you are safe. You are not.
If you think you can hide something on your computer. You can not.
If you think you are anonymous on the internet. You are not.
If you think that they are ways to keep your privacy. They are not any.
Bear that in your mind. This is the world we are live in.


           █████████████████     ████████
          █████████████████     ████████
         █████████████████     ████████
        █████████████████     ████████
       ████████              ████████
      ████████              ████████
     ████████     ███████  ████████     ████████
    ████████     █████████████████     ████████
   ████████     █████████████████     ████████
  ████████     █████████████████     ████████
 ████████     █████████████████     ████████
████████     ████████  ███████     ████████
            ████████              ████████
           ████████              ████████
          ████████     █████████████████
         ████████     █████████████████
        ████████     █████████████████
       ████████     █████████████████
▄▄
██
██
██
██
██
██
██
██
██
██     
██
██
▬▬ THE LARGEST & MOST TRUSTED ▬▬
      BITCOIN SPORTSBOOK     
   ▄▄
██
██
██
██
██
██
██
██
██
██     
██
██
             ▄▄▄▄▀▀▀▀▄
     ▄▄▄▄▀▀▀▀        ▀▄▄▄▄          
▄▀▀▀▀                 █   ▀▀▀▀▀▀▀▄▄
█                    ▀▄          █
 █   ▀▌     ██▄        █          █              
 ▀▄        ▐████▄       █        █
  █        ███████▄     ▀▄       █
   █      ▐████▄█████████████████████▄
   ▀▄     ███████▀                  ▀██
    █      ▀█████    ▄▄        ▄▄    ██
     █       ▀███   ████      ████   ██
     ▀▄        ██    ▀▀        ▀▀    ██
      █        ██        ▄██▄        ██
       █       ██        ▀██▀        ██
       ▀▄      ██    ▄▄        ▄▄    ██
        █      ██   ████      ████   ██
         █▄▄▄▄▀██    ▀▀        ▀▀    ██
               ██▄                  ▄██
                ▀████████████████████▀




  CASINO  ●  DICE  ●  POKER  
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
   24 hour Customer Support   

▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
benjamindees
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


View Profile
March 13, 2014, 06:08:46 AM
Last edit: March 13, 2014, 06:18:48 AM by benjamindees
 #64

Backdoor in Samsung Galaxy Devices Allows Remote Access to Storage

http://mobile.slashdot.org/story/14/03/12/2143225/replicant-os-developers-find-backdoor-in-samsung-galaxy-devices

Meaning basically anyone with some fairly simple hardware can read and write data on your phone remotely.  And this is not a bug.  It was built-in deliberately.

Oh, and a timely interview with RMS for the InfoWars haters.

Civil Liberty Through Complex Mathematics
tkbx
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
March 14, 2014, 12:24:05 AM
 #65

I guess we need to keep our offline computers enclosed within a copper wire mesh.

Make sure the whole room is a Faraday cage.

I think sound proofing and no windows(physical ones that is) is also in order...
If you're too paranoid to have a window in the room you use your computer in, you're way too paranoid to have MS Windows on your computer. Hell, you're probably too paranoid for Linux. OpenBSD with disk, swap, and RAM encryption, all networking disabled at compile time, no sudo, root password set to randomness.
CJGoodings
Full Member
***
Offline Offline

Activity: 322
Merit: 100



View Profile
March 14, 2014, 11:36:34 AM
 #66

If they cant access through radio wave tech, they always have the power lines to work with. Internet over power lines has been used for some time now, even becoming available to the average consumer cheap as fuck, no telling how far the government's spy arm has taken that tech, especially now with the direct outgoing data coming off PG&E recent smartmeter's.
TECSHARE
In memoriam
Legendary
*
Offline Offline

Activity: 3318
Merit: 2008


First Exclusion Ever


View Profile WWW
March 14, 2014, 08:09:48 PM
 #67

If they cant access through radio wave tech, they always have the power lines to work with. Internet over power lines has been used for some time now, even becoming available to the average consumer cheap as fuck, no telling how far the government's spy arm has taken that tech, especially now with the direct outgoing data coming off PG&E recent smartmeter's.
 


Don't think they can monitor you with radio waves? Look at the "TEMPEST" project. Not new technology, can be done from miles away. Now with new smart grid technology every inch of your home, media and internet habits can be tracked with a hardwired system built into every bit of electronic equipment you own. Additionally these systems are EXTREMELY vulnerable to exploit meaning 3rd parties other than 3 letter organizations, such as criminals may be able to access this data. Your crazy uncle who thinks his refrigerator is spying on him might not be so crazy after all.
Bit_Happy
Legendary
*
Offline Offline

Activity: 2114
Merit: 1040


A Great Time to Start Something!


View Profile
March 14, 2014, 09:01:53 PM
 #68

Fortune Cookie says,

"The only secure computer is one that's unplugged, locked in a safe,
and buried 20 feet under the ground in a secret location... and I'm
not even too sure about that one"
-- Dennis Huges, FBI.

What about OpenBSD isn't that a safe system?

Kenshin
Sr. Member
****
Offline Offline

Activity: 280
Merit: 250


View Profile
March 14, 2014, 09:07:14 PM
 #69

The ongoing series of leaks from the NSA and its cyberspying programs have got many wondering how to stay safe. It’s been joked that the only guarantee is to be offline, but now even that extreme approach doesn’t guarantee an escape from the US agency’s eyes, according to a New York Times report.

Citing leaked documents, the paper claims that the NSA has developed “a secret technology” which taps into radio waves to access computers and hardware, even those that are offline. The setup relies on a radio-transmitting device — such as a USB or other kinds of hardware/peripherals — being connected to the device in question, either by an agent, a manufacturer or users themselves.

There’s no evidence that the technology has ever been used, but it is a particularly troubling development considering that the agency is already reported to have all manner of tools to gain backdoor access to popular consumer and business electronic devices.

➤ N.S.A. Devises Radio Pathway Into Computers [New York Times]
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html




http://thenextweb.com/insider/2014/01/15/nsa-reportedly-able-access-offline-computers-thanks-radio-wave-technology/?fromcat=all#!seaPr

This is nothing new, this used to be called Tempest https://en.wikipedia.org/wiki/Tempest_%28codename%29
Bit_Happy
Legendary
*
Offline Offline

Activity: 2114
Merit: 1040


A Great Time to Start Something!


View Profile
March 14, 2014, 09:10:10 PM
 #70

The ongoing series of leaks from the NSA and its cyberspying programs have got many wondering how to stay safe. It’s been joked that the only guarantee is to be offline, but now even that extreme approach doesn’t guarantee an escape from the US agency’s eyes, according to a New York Times report.

Citing leaked documents, the paper claims that the NSA has developed “a secret technology” which taps into radio waves to access computers and hardware, even those that are offline. The setup relies on a radio-transmitting device — such as a USB or other kinds of hardware/peripherals — being connected to the device in question, either by an agent, a manufacturer or users themselves.

There’s no evidence that the technology has ever been used, but it is a particularly troubling development considering that the agency is already reported to have all manner of tools to gain backdoor access to popular consumer and business electronic devices.

➤ N.S.A. Devises Radio Pathway Into Computers [New York Times]
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html




http://thenextweb.com/insider/2014/01/15/nsa-reportedly-able-access-offline-computers-thanks-radio-wave-technology/?fromcat=all#!seaPr

This is nothing new, this used to be called Tempest https://en.wikipedia.org/wiki/Tempest_%28codename%29

TEMPEST is a National Security Agency codename referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.[1] TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).


Clearly they have too much funding and power...

benjamindees
Legendary
*
Offline Offline

Activity: 1330
Merit: 1000


View Profile
April 10, 2014, 06:45:18 AM
 #71

Year-old General Dynamics press release confirms that the Samsung Galaxy S3 can be remotely rooted and, furthermore, that the backdoor can be remotely patched:

Quote
To do this, General Dynamics effectively "roots" the handset, replacing the system image with one that has been tested and certified, to ensure the integrity of the Android operating system.

This can be done over the air, according to Guzelian, meaning that workers can bring their own handset into the corporate environment and have it secured for enterprise use.

"You can go and buy a Galaxy S3, call us with the IMEI number, and we can basically re-flash it over the network. Afterwards, no-one else can update the operating system, and the user is limited to what they can add - apps can only come from an approved app store," he said.

http://www.v3.co.uk/v3-uk/news/2250071/general-dynamics-secures-samsung-and-lg-android-smartphones-to-take-on-blackberry


"Security researcher" Dan Rosenberg makes an ass of himself.  Ars Technica helps:

http://arstechnica.com/security/2014/03/virtually-no-evidence-for-claim-of-remote-backdoor-in-samsung-galaxy-phones/

Quote
I think calling this a "backdoor" is a bit far-fetched, much less one that can allow parties to remotely access data from your phone...  There is virtually no evidence for the ability to remotely execute this functionality.

What an idiot.

Civil Liberty Through Complex Mathematics
Keeney43
Newbie
*
Offline Offline

Activity: 12
Merit: 0


View Profile
April 10, 2014, 06:23:05 PM
 #72

Just cover your computer in tin foil!
bitsmichel
Sr. Member
****
Offline Offline

Activity: 518
Merit: 250



View Profile
April 10, 2014, 11:14:56 PM
 #73

block radio waves  Smiley

bryant.coleman
Legendary
*
Offline Offline

Activity: 3766
Merit: 1217


View Profile
April 11, 2014, 02:14:15 AM
 #74

Soon we will have hackers stealing bitcoins from offline wallets. The advancement in technology is not always a good news.
zolace
Sr. Member
****
Offline Offline

Activity: 364
Merit: 250


View Profile
April 12, 2014, 12:58:55 PM
 #75


    If you think you are safe. You are not.
    If you think you can hide something on your computer. You can not.
    If you think you are anonymous on the internet. You are not.
    If you think that they are ways to keep your privacy. They are not any.
    Bear that in your mind. This is the world we are live in.


⚂⚄ Pocket Dice — Real dice experienceProvably Fair
Free BTC Faucet
⚅⚁
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
bitsmichel
Sr. Member
****
Offline Offline

Activity: 518
Merit: 250



View Profile
April 12, 2014, 01:15:39 PM
 #76

If the NSA can do it, then so can others.. less safe world for all of us

notbatman
Legendary
*
Offline Offline

Activity: 2212
Merit: 1038



View Profile
April 13, 2014, 12:47:45 AM
 #77

If hackers figure out the spreading codes for everybody's nanotech implants we could be in for a zombie apocalypse.

bryant.coleman
Legendary
*
Offline Offline

Activity: 3766
Merit: 1217


View Profile
April 13, 2014, 03:03:35 AM
 #78

If hackers figure out the spreading codes for everybody's nanotech implants we could be in for a zombie apocalypse.

Lol... that will be interesting. BTW... how many people in this world are actually having nano-tech implants? Enough to create a zombie army?
notbatman
Legendary
*
Offline Offline

Activity: 2212
Merit: 1038



View Profile
April 13, 2014, 04:16:43 AM
 #79

If hackers figure out the spreading codes for everybody's nanotech implants we could be in for a zombie apocalypse.

Lol... that will be interesting. BTW... how many people in this world are actually having nano-tech implants? Enough to create a zombie army?

Some of the web sites that follow the transhumanist movement push numbers as high as 99% of the global population.
Wipeout2097
Sr. Member
****
Offline Offline

Activity: 840
Merit: 255


SportsIcon - Connect With Your Sports Heroes


View Profile
April 13, 2014, 04:53:22 AM
Last edit: April 13, 2014, 10:45:25 AM by Wipeout2097
 #80


    If you think you are safe. You are not.
    If you think you can hide something on your computer. You can not.
    If you think you are anonymous on the internet. You are not.
    If you think that they are ways to keep your privacy. They are not any.
    Bear that in your mind. This is the world we are live in.
That "you" is a bit of a stretch. Yes, the adversaries are very competent at cracking and spying, but there are ways to improve one's privacy and anonymity to the point of being able to do most of one wants, electronically and comunication wise. We just compromise this due to lazyness and for the sake of touchy touchy screens, virtual friends and "apps".


███████████████████████████████████████████████████████████████
██▀       ▀█       ▀████████████        ▀█         █▀       ▀██
██   ▀██▄▄▄█   ██   ████████████   ███   ████   ████   ▀██▄▄▄██
███▄     ▀██       ▄████████████       ▄█████   █████▄     ▀███
██▀▀▀██▄   █   █████████████████   █▄  ▀█████   ████▀▀▀██▄   ██
██▄       ▄█   █████████████████   ██▄  ▀████   ████▄       ▄██
███████████████████████████████████████████████████████████████
██       ██▀      ▀█████████████    ▀██   █████████████████████
████   ███   ▄██▄   ████████████     ▀█   █████████████████████
████   ███   ████████   ████   █   ▄  ▀   █████████████████████
████   ███   ▀██▀   █   ████   █   █▄     █████████████████████
██       ██▄      ▄███        ██   ██▄    █████████████████████
███████████████████████████████████████████████████████████████
██████████████
██
██
██
██
██
██
██
██
██
██
██
██████████████
████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████                                                             ████████████████████████████████████████████████
.
.
.

████████████████████████████████████████████████████████████          ████████████████                                 ██████████████████████████████████████████████████████████████████████████████████████
██████████████
██
██
██
██
██
██
██
██
██
██
██
██████████████
███████
██
██
██
██
██
██
██
██
██
██
██
███████
███████
██
██
██
██
██
██
██
██
██
██
██
███████
►►  Powered by
BOUNTY
DETECTIVE
Pages: « 1 2 3 [4] 5 6 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!