[prev in list] [next in list] [prev in thread] [next in thread] 

List:       qubes-users
Subject:    [qubes-users] Re: more details on how wireless eavesdropping / hacking occurs
From:       raahelps () gmail ! com
Date:       2016-01-31 4:44:49
Message-ID: 062b2681-9296-4074-95b2-1191573f623f () googlegroups ! com
[Download RAW message or body]


On Saturday, January 30, 2016 at 11:34:38 PM UTC-5, raah...@gmail.com wrote:
> On Saturday, January 30, 2016 at 11:30:17 PM UTC-5, raah...@gmail.com wrote:
> > On Saturday, January 30, 2016 at 11:29:24 PM UTC-5, raah...@gmail.com wrote:
> > > On Friday, January 29, 2016 at 8:56:41 PM UTC-5, Syd Brisby wrote:
> > > > Possibilites for wireless intrusion could involve Ham radio picking up radio \
> > > > signals from the computer's hardware and transmitting signals back to them. \
> > > > Software defined radio may have some hacker-friendly features. Edward Snowden \
> > > > has stated that the NSA is able to wirelessly hack computers without them \
> > > > being connected to a network. If the NSA can do it, then hackers would surely \
> > > > also be experimenting in that direction to.    
> > > > Someone here reckons that these descriptions are not wireless attacks but \
> > > > BIOS malware attacks. However BIOS malware doesn't explain some instances. \
> > > > Like capture of data and remote shutoff of a mini computer that has no \
> > > > wifi/bluetooth module (only IR) and has never been connected to the Internet. \
> > > > A laptop with wifi/bluetooth blocked by a hardware switch, and a netbook with \
> > > > wifi/bluetooth module removed - and both being hacked and data stolen. In \
> > > > these situations how does BIOS malware send the data back to the hacker (when \
> > > > no ethernet connection is ever used)? Data has also been captured while using \
> > > > Qubes on a laptop (with wifi hardware blocked) - when it is designed to \
> > > > isolate OS areas including the network. There have also been occasions when \
> > > > data has been stolen from a netbook (with wifi softblocked), when a person \
> > > > has come up to sit in the next seat - with a smartphone placed in front of \
> > > > them and just sitting there doing nothing (undoubtedly while a remote hacker \
> > > > hacks the computer via the smartphone). I think that what is happening in \
> > > > hacker culture is that smartphone, wifi, bluetooth, and other radio hacking \
> > > > tricks have crossed over to computers. Afterall, it's basically all the same \
> > > > kind of hardware and software. People just don't want to believe it because \
> > > > it's too difficult to deal with.
> > > 
> > > 
> > > 
> > > 
> > > some bios and cpu have wireles connection for supposedly business \
> > > administration like a vpro thing.  the hacker dragos from pwn2own has talked \
> > > about this and how the malware can be almost impossible to get rid of if it \
> > > jumps between diff machines.
> > 
> > also speaking of bad network hosts,  this was great for dhclient and shellshock \
> > exploit.
> 
> there has also been poc's from some colleges on how virus can travel between diff \
> pc's with speakers and mics.

oh and btw,  with the wireless bios or cpu,  computer does not even need to be on to \
"administer" or do "maintenance" on it haha.

-- 
You received this message because you are subscribed to the Google Groups \
"qubes-users" group. To unsubscribe from this group and stop receiving emails from \
it, send an email to qubes-users+unsubscribe@googlegroups.com. To post to this group, \
send email to qubes-users@googlegroups.com. To view this discussion on the web visit \
https://groups.google.com/d/msgid/qubes-users/062b2681-9296-4074-95b2-1191573f623f%40googlegroups.com.
 For more options, visit https://groups.google.com/d/optout.



[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic