[prev in list] [next in list] [prev in thread] [next in thread]
List: qubes-users
Subject: [qubes-users] Re: more details on how wireless eavesdropping / hacking occurs
From: raahelps () gmail ! com
Date: 2016-01-31 4:44:49
Message-ID: 062b2681-9296-4074-95b2-1191573f623f () googlegroups ! com
[Download RAW message or body]
On Saturday, January 30, 2016 at 11:34:38 PM UTC-5, raah...@gmail.com wrote:
> On Saturday, January 30, 2016 at 11:30:17 PM UTC-5, raah...@gmail.com wrote:
> > On Saturday, January 30, 2016 at 11:29:24 PM UTC-5, raah...@gmail.com wrote:
> > > On Friday, January 29, 2016 at 8:56:41 PM UTC-5, Syd Brisby wrote:
> > > > Possibilites for wireless intrusion could involve Ham radio picking up radio \
> > > > signals from the computer's hardware and transmitting signals back to them. \
> > > > Software defined radio may have some hacker-friendly features. Edward Snowden \
> > > > has stated that the NSA is able to wirelessly hack computers without them \
> > > > being connected to a network. If the NSA can do it, then hackers would surely \
> > > > also be experimenting in that direction to.
> > > > Someone here reckons that these descriptions are not wireless attacks but \
> > > > BIOS malware attacks. However BIOS malware doesn't explain some instances. \
> > > > Like capture of data and remote shutoff of a mini computer that has no \
> > > > wifi/bluetooth module (only IR) and has never been connected to the Internet. \
> > > > A laptop with wifi/bluetooth blocked by a hardware switch, and a netbook with \
> > > > wifi/bluetooth module removed - and both being hacked and data stolen. In \
> > > > these situations how does BIOS malware send the data back to the hacker (when \
> > > > no ethernet connection is ever used)? Data has also been captured while using \
> > > > Qubes on a laptop (with wifi hardware blocked) - when it is designed to \
> > > > isolate OS areas including the network. There have also been occasions when \
> > > > data has been stolen from a netbook (with wifi softblocked), when a person \
> > > > has come up to sit in the next seat - with a smartphone placed in front of \
> > > > them and just sitting there doing nothing (undoubtedly while a remote hacker \
> > > > hacks the computer via the smartphone). I think that what is happening in \
> > > > hacker culture is that smartphone, wifi, bluetooth, and other radio hacking \
> > > > tricks have crossed over to computers. Afterall, it's basically all the same \
> > > > kind of hardware and software. People just don't want to believe it because \
> > > > it's too difficult to deal with.
> > >
> > >
> > >
> > >
> > > some bios and cpu have wireles connection for supposedly business \
> > > administration like a vpro thing. the hacker dragos from pwn2own has talked \
> > > about this and how the malware can be almost impossible to get rid of if it \
> > > jumps between diff machines.
> >
> > also speaking of bad network hosts, this was great for dhclient and shellshock \
> > exploit.
>
> there has also been poc's from some colleges on how virus can travel between diff \
> pc's with speakers and mics.
oh and btw, with the wireless bios or cpu, computer does not even need to be on to \
"administer" or do "maintenance" on it haha.
--
You received this message because you are subscribed to the Google Groups \
"qubes-users" group. To unsubscribe from this group and stop receiving emails from \
it, send an email to qubes-users+unsubscribe@googlegroups.com. To post to this group, \
send email to qubes-users@googlegroups.com. To view this discussion on the web visit \
https://groups.google.com/d/msgid/qubes-users/062b2681-9296-4074-95b2-1191573f623f%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic