Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.2600.hackers    |    Pretty sure it ain't about the Atari...    |    12,449 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 12,363 of 12,449    |
|    rek2 hispagatos to All    |
|    Laptop Privacy    |
|    30 Dec 24 21:04:01    |
   
   XPost: hispagatos.talk, alt.2600, alt.2600.madrid   
   From: rek2@hispagatos.org.invalid   
      
   ** Making Laptops Invisible To Tracking / Attackers **   
      
   https://odysee.com/@RTP:9/laptop-removing_mic_ble_wifi:5   
      
   How to remove microphone, bluetooth, WiFi, webcam / camera on your   
   laptop. Follow for any similar laptop model, once you find the placement   
   of the microphone, bluetooth, wifi, camera. This video uses a Lenovo   
   Thinkpad X230 for our example machine. An attacker cannot gain access   
   without psysical, or remote access hardware on a machine (most have no   
   clue about SC attacks).   
      
   We know (example: stories like pegasus) our hardware can potentially be   
   turned against us when malware strikes.   
      
   If our devices acquire said malware, a few key pieces of hardware could   
   be EASILY turned against us (and others, but this is most common):   
      
   Our microphone can be turned into a hidden bug in our home. Our webcams   
   can be used a surveillance cameras to watch our every move when the   
   laptop lid is open. Our WiFi / bluetooth devices send out radio beacons,   
   sharing everything from signal strength to narrow down location, all the   
   way to details on our pattern of life (bssid tracking). And if   
   compromised, could even allow for other types of data / compromise   
   smuggling. Without the above hardware devices, without networking, our   
   devices are much less easily tracked - almost invisible... though there   
   are other types of unique fingerprint, as we will continue covering on   
   this channel.   
      
   FOR SECURITY BENEFIT:   
      
   This also brings into play great security benefits - so much in targeted   
   attacks rely upon prediction of target behavior / accessibility.   
      
   From finding devices to compromise, to opening remote backdoors. Your   
   hardware network / wireless devices can easily be turned against you.   
      
   Without networking / wireless access, attacks are much less likely (but   
   not impossible if you give someone physical access / other means).   
      
   By removing these, we take greatly reduce accessibility for the 'bad   
   guys'.   
      
      
   Happy Hacking   
   ReK2   
      
   --   
   - {gemini,https}://{,rek2.}hispagatos.org - mastodon: @rek2@hispagatos.space   
   - [https|gemini]://2600.Madrid - https://hispagatos.space/@rek2   
   - https://keyoxide.org/A31C7CE19D9C58084EA42BA26C0B0D11E9303EC5   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   
|
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca