Pages:
Author

Topic: The NSA is reportedly able to access offline computers thanks to radio wave tech - page 3. (Read 7606 times)

legendary
Activity: 1330
Merit: 1000
Year-old General Dynamics press release confirms that the Samsung Galaxy S3 can be remotely rooted and, furthermore, that the backdoor can be remotely patched:

Quote
To do this, General Dynamics effectively "roots" the handset, replacing the system image with one that has been tested and certified, to ensure the integrity of the Android operating system.

This can be done over the air, according to Guzelian, meaning that workers can bring their own handset into the corporate environment and have it secured for enterprise use.

"You can go and buy a Galaxy S3, call us with the IMEI number, and we can basically re-flash it over the network. Afterwards, no-one else can update the operating system, and the user is limited to what they can add - apps can only come from an approved app store," he said.

http://www.v3.co.uk/v3-uk/news/2250071/general-dynamics-secures-samsung-and-lg-android-smartphones-to-take-on-blackberry


"Security researcher" Dan Rosenberg makes an ass of himself.  Ars Technica helps:

http://arstechnica.com/security/2014/03/virtually-no-evidence-for-claim-of-remote-backdoor-in-samsung-galaxy-phones/

Quote
I think calling this a "backdoor" is a bit far-fetched, much less one that can allow parties to remotely access data from your phone...  There is virtually no evidence for the ability to remotely execute this functionality.

What an idiot.
legendary
Activity: 2114
Merit: 1040
A Great Time to Start Something!
The ongoing series of leaks from the NSA and its cyberspying programs have got many wondering how to stay safe. It’s been joked that the only guarantee is to be offline, but now even that extreme approach doesn’t guarantee an escape from the US agency’s eyes, according to a New York Times report.

Citing leaked documents, the paper claims that the NSA has developed “a secret technology” which taps into radio waves to access computers and hardware, even those that are offline. The setup relies on a radio-transmitting device — such as a USB or other kinds of hardware/peripherals — being connected to the device in question, either by an agent, a manufacturer or users themselves.

There’s no evidence that the technology has ever been used, but it is a particularly troubling development considering that the agency is already reported to have all manner of tools to gain backdoor access to popular consumer and business electronic devices.

➤ N.S.A. Devises Radio Pathway Into Computers [New York Times]
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html




http://thenextweb.com/insider/2014/01/15/nsa-reportedly-able-access-offline-computers-thanks-radio-wave-technology/?fromcat=all#!seaPr

This is nothing new, this used to be called Tempest https://en.wikipedia.org/wiki/Tempest_%28codename%29

TEMPEST is a National Security Agency codename referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations.[1] TEMPEST covers both methods to spy upon others and also how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).


Clearly they have too much funding and power...
sr. member
Activity: 280
Merit: 250
The ongoing series of leaks from the NSA and its cyberspying programs have got many wondering how to stay safe. It’s been joked that the only guarantee is to be offline, but now even that extreme approach doesn’t guarantee an escape from the US agency’s eyes, according to a New York Times report.

Citing leaked documents, the paper claims that the NSA has developed “a secret technology” which taps into radio waves to access computers and hardware, even those that are offline. The setup relies on a radio-transmitting device — such as a USB or other kinds of hardware/peripherals — being connected to the device in question, either by an agent, a manufacturer or users themselves.

There’s no evidence that the technology has ever been used, but it is a particularly troubling development considering that the agency is already reported to have all manner of tools to gain backdoor access to popular consumer and business electronic devices.

➤ N.S.A. Devises Radio Pathway Into Computers [New York Times]
http://www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html




http://thenextweb.com/insider/2014/01/15/nsa-reportedly-able-access-offline-computers-thanks-radio-wave-technology/?fromcat=all#!seaPr

This is nothing new, this used to be called Tempest https://en.wikipedia.org/wiki/Tempest_%28codename%29
legendary
Activity: 2114
Merit: 1040
A Great Time to Start Something!
Fortune Cookie says,

"The only secure computer is one that's unplugged, locked in a safe,
and buried 20 feet under the ground in a secret location... and I'm
not even too sure about that one"
-- Dennis Huges, FBI.

What about OpenBSD isn't that a safe system?
legendary
Activity: 3318
Merit: 2008
First Exclusion Ever
If they cant access through radio wave tech, they always have the power lines to work with. Internet over power lines has been used for some time now, even becoming available to the average consumer cheap as fuck, no telling how far the government's spy arm has taken that tech, especially now with the direct outgoing data coming off PG&E recent smartmeter's.
 


Don't think they can monitor you with radio waves? Look at the "TEMPEST" project. Not new technology, can be done from miles away. Now with new smart grid technology every inch of your home, media and internet habits can be tracked with a hardwired system built into every bit of electronic equipment you own. Additionally these systems are EXTREMELY vulnerable to exploit meaning 3rd parties other than 3 letter organizations, such as criminals may be able to access this data. Your crazy uncle who thinks his refrigerator is spying on him might not be so crazy after all.
full member
Activity: 322
Merit: 100
If they cant access through radio wave tech, they always have the power lines to work with. Internet over power lines has been used for some time now, even becoming available to the average consumer cheap as fuck, no telling how far the government's spy arm has taken that tech, especially now with the direct outgoing data coming off PG&E recent smartmeter's.
sr. member
Activity: 350
Merit: 251
I guess we need to keep our offline computers enclosed within a copper wire mesh.

Make sure the whole room is a Faraday cage.

I think sound proofing and no windows(physical ones that is) is also in order...
If you're too paranoid to have a window in the room you use your computer in, you're way too paranoid to have MS Windows on your computer. Hell, you're probably too paranoid for Linux. OpenBSD with disk, swap, and RAM encryption, all networking disabled at compile time, no sudo, root password set to randomness.
legendary
Activity: 1330
Merit: 1000
Backdoor in Samsung Galaxy Devices Allows Remote Access to Storage

http://mobile.slashdot.org/story/14/03/12/2143225/replicant-os-developers-find-backdoor-in-samsung-galaxy-devices

Meaning basically anyone with some fairly simple hardware can read and write data on your phone remotely.  And this is not a bug.  It was built-in deliberately.

Oh, and a timely interview with RMS for the InfoWars haters.
legendary
Activity: 1596
Merit: 1005
★Nitrogensports.eu★
If you think you are safe. You are not.
If you think you can hide something on your computer. You can not.
If you think you are anonymous on the internet. You are not.
If you think that they are ways to keep your privacy. They are not any.
Bear that in your mind. This is the world we are live in.
legendary
Activity: 1330
Merit: 1000
Intel CEO tells Reddit to "Ask Me Anything," fails to answer two top-voted questions about hardware backdoors in CPUs:

http://www.reddit.com/r/IAmA/comments/1ycs5l/hi_reddit_im_brian_krzanich_ceo_of_intel_ask_me/
sr. member
Activity: 364
Merit: 250
that means that they can watch you wacking off to the porn on your computer even when the wifi is turned off...lol

Yeah, but so far inflatable dolls are safe from the NSA...
http://www.dupont.com/products-and-services/electronic-electrical-materials/flexible-rigidflex-circuit-materials/brands/pyralux-flexible-circuit.html

more to worry
with this technology they could access even that
legendary
Activity: 1176
Merit: 1001
minds.com/Wilikon
that means that they can watch you wacking off to the porn on your computer even when the wifi is turned off...lol

Yeah, but so far inflatable dolls are safe from the NSA...
legendary
Activity: 1456
Merit: 1001
This is the land of wolves now & you're not a wolf
that means that they can watch you wacking off to the porn on your computer even when the wifi is turned off...lol
legendary
Activity: 1176
Merit: 1001
minds.com/Wilikon
I am sure this should help anyone wanting to hack into someone's offline computer...
You asked Smiley

(or someone did)

Now we know it is definitely possible to hack offline computers with radio wave tech...
full member
Activity: 148
Merit: 100
I am sure this should help anyone wanting to hack into someone's offline computer...
You asked Smiley

(or someone did)
legendary
Activity: 1176
Merit: 1001
minds.com/Wilikon
Well in that case, yes anyone can access Intel vPro CPUs with Active Management Technology remotely, provided the motherboard also supports these features of the CPU.  Then it is rather trivial to remotely access the CPU at Ring level -2, which is below Ring level -1 (the Hypervisor level) and also below Ring 0 (kernel mode level).  This area of the CPU known as SMM (System Management Mode) is more privileged than a hypervisor and has complete access to all system memory including the kernel and hypervisor memory.  Code running in SMM also has access to I/O devices (IN/OUT, MMIO).  This code running in SMM is not subject to Intel TXT (Trusted Execution Technology) meaning at no point is code running in SMM checked or verified.  This code is outside the reach of the operating system or any other software installed.  There are many exploits available online, however it would not be wise of me to link directly to them.  If one were interested in learning more they could start here:
http://www.symantec.com/connect/blogs/attacks-against-system-management-mode-smm
Hope this helps.

I am sure this should help anyone wanting to hack into someone's offline computer...
full member
Activity: 148
Merit: 100
Well in that case, yes anyone can access Intel vPro CPUs with Active Management Technology remotely, provided the motherboard also supports these features of the CPU.  Then it is rather trivial to remotely access the CPU at Ring level -2, which is below Ring level -1 (the Hypervisor level) and also below Ring 0 (kernel mode level).  This area of the CPU known as SMM (System Management Mode) is more privileged than a hypervisor and has complete access to all system memory including the kernel and hypervisor memory.  Code running in SMM also has access to I/O devices (IN/OUT, MMIO).  This code running in SMM is not subject to Intel TXT (Trusted Execution Technology) meaning at no point is code running in SMM checked or verified.  This code is outside the reach of the operating system or any other software installed.  There are many exploits available online, however it would not be wise of me to link directly to them.  If one were interested in learning more they could start here:
http://www.symantec.com/connect/blogs/attacks-against-system-management-mode-smm
Hope this helps.
legendary
Activity: 1176
Merit: 1001
minds.com/Wilikon
All I am saying is it would be nice if the members of this forum spent more time building services for Bitcoin, making it bigger and stronger, rather than spending time on things they have little or no control over, that's all.

I understand your point. But this section is to cool off and talk about stuff we don't control, stuff we wish were different, stuff that scares us, stuff that's amazing and want to share, stuff we don't agree with, stuff we don't care about.

Here you can call me names as long as you feel like, prove me wrong, tell me I am wasting my time talking about stuff I can't understand, etc, etc... it's all cool dude. Seriously.

As Phil Coulson says "Tahiti - Its a magical place..." Wink
full member
Activity: 148
Merit: 100
All I am saying is it would be nice if the members of this forum spent more time building services for Bitcoin, making it bigger and stronger, rather than spending time on things they have little or no control over, that's all.
legendary
Activity: 1176
Merit: 1001
minds.com/Wilikon
Dude. You believe seriously all the companies involved with In Q Tel will be openly listed on their website? Maybe we should all stop or you will ask for our IP address and sue us for libel...  Grin

Our little thread is a menace to NSA's society...
This is exactly the kind of conspiracy fiction I was referring to when I stated this thread "has absolutely nothing to do with Bitcoin".
Speculative statements based on pure fantasy, backed by nothing more than "It could happen Dude, why you so stupid?".
No proof, no facts, just a bunch of dreamers.  It would be funny if it weren't so sad.

First, I don't believe you are stupid, but you have the right to call me/us dreamers. Second, everything you said about this thread could be applied to your logic and is sadly funny  Smiley

Regarding bitcoin it matters and third of all you are replying to a thread in "Bitcoin Forum > Other > Politics & Society >"
Did you miss the part that says "Other"? Smiley
No you missed the part where if you cannot provide proof for the claims you make, it's all hot air.  Be prepared to be challenged.  You are a fool.

Yes I am  Grin
Have fun playing Don Quixote in front of your screen while you challenge me with your proofs...

Pages:
Jump to: