Silk Road forums
Discussion => Security => Topic started by: HCeline on July 27, 2013, 09:02 pm
-
Reading around on the qubes forum trying to figure out how to set up vpn proxyvm's I stumbled upon a slightly dis-concerning post about ways that people are hacked and tracked apart from standard methods. Here's a list of some frightening things that were mentioned that may apply to us.
Encryption keys can be revealed from a smartphone or tablet by using an antenna to capture radio signals from the encrypting chips:
http://www.technologyreview.com/news/427139/eavesdropping-antennas-can-steal-your-smart-phones-secrets/
or captured with an AM radio
http://www.geekosystem.com/smartphone-encryption-key/
There's a flying wifi drone that can hack your equipment from above:
http://www.geekosystem.com/hacker-drone/
Keystroke capturing by using an iphone accelerometer:
http://www.geekosystem.com/iphone-keyboard-keylogging/
Using a smartphone to hack into a plane's flight control computer:
http://www.upi.com/Science_News/Technology/2013/04/11/Hack-shows-how-smartphone-can-take-over-airplane-flight-computers/UPI-35931365715652/
using a beagleboard usb charger to hack into an iphone:
http://www.forbes.com/sites/andygreenberg/2013/06/02/researchers-say-they-can-hack-your-iphone-with-a-malicious-charger/
And the contents of a computer monitor can be copied by capturing radio signals from the screen.
http://www.lightbluetouchpaper.org/2006/03/09/video-eavesdropping-demo-at-cebit-2006/
Well i'm gonna pull my tinfoil hat a tad lower. The ones that scare me the most are the flying hack plane, and the capturing signals from computer screens to see what others are viewing. If independent researchers with limited budgets were able to pull these things off imagine what our bloated overfunded anti drug zealots can pull off.
-
If they can't figure out who you are to begin with, they can't use any of this stuff against you. The whole game is identity.
-
Mobile phones have become mobile spying centers, even worse they can remotely install malware which takes pictures automatically when the phone is out of your pocket to render a 3D model of any interior.
http://www.cracked.com/article_20345_5-terrifying-smartphone-hacks-you-wont-believe-are-possible_p2.html
CLEARNET WARNING OBVIOUSLY BUT A VWERY INFORMATIVE ARTICLE ON MOBILE PHONE INSECURITY.
-
Once your anonymity is broken, if they want to get you they probably can. It isn't like any of us are operating out of SCIF's. Do your best to maintain anonymity (use Tor, hardened OS, isolation, yada yada), and if that fails hope that your attacker is incompetent. Being untraceable is 9/10ths of the game.