kallend 2,106 #1 January 15, 2014 www.nytimes.com/2014/01/15/us/nsa-effort-pries-open-computers-not-connected-to-internet.html?google_editors_picks=true I expect they'll be thought reading soon.... The only sure way to survive a canopy collision is not to have one. Quote Share this post Link to post Share on other sites
Arvoitus 1 #2 January 15, 2014 QuoteThe technology ... relies on a covert channel of radio waves that can be transmitted from tiny circuit boards and USB cards inserted surreptitiously into the computers. Quotethe radio frequency hardware must be physically inserted by a spy, a manufacturer or an unwitting user No shit, they can access a computer that has their custom radio HW attached to it.Your rights end where my feelings begin. Quote Share this post Link to post Share on other sites
kelpdiver 2 #3 January 15, 2014 time to build out the Faraday cage in the office Quote Share this post Link to post Share on other sites
Bertt 0 #4 January 16, 2014 I'm still waiting for a revelation about the NSA that is surprising. During the Cold War, there were "rumors" that the Soviets went to West Germany to steal an IBM 360 computer because they found out that those they had bought were bugged. The Soviets in turn were known to have installed keystroke capture bugs in IBM Selectric typewriters used in sensitive U.S. installations. I guess these shocking revelations will continue as long as the clueless press considers them fascinating.You don't have to outrun the bear. Quote Share this post Link to post Share on other sites
Kennedy 0 #5 January 16, 2014 Look into badBIOS. It's an in the wild virus that can jump an air gap using speakers an microphones. It's been out and about for three years or more.witty subliminal message Guard your honor, let your reputation fall where it will, and outlast the bastards. 1* Quote Share this post Link to post Share on other sites
SkyDekker 1,465 #6 January 16, 2014 KennedyLook into badBIOS. It's an in the wild virus that can jump an air gap using speakers an microphones. It's been out and about for three years or more. Has anybody other than Dragus Ruiu seen it yet? Quote Share this post Link to post Share on other sites
Kennedy 0 #7 January 16, 2014 Other forensic examiners have seen the symptoms, I don't think anybody including Ruiu has actually seen the cause(s) in code. Side note: who doesn't think the NSA watch our domestic security researchers VERY closely? Wouldn't it make sense to watch the guys who know how attacks work and and Might find something they haven't seen yet?witty subliminal message Guard your honor, let your reputation fall where it will, and outlast the bastards. 1* Quote Share this post Link to post Share on other sites
Andy9o8 2 #8 January 16, 2014 Quotewho doesn't think the NSA watch our domestic security researchers VERY closely? How closely is that? If there weren't exploitable gaps, "Snowden" wouldn't have recently entered the lexicon as a verb. Quote Share this post Link to post Share on other sites
Kennedy 0 #9 January 16, 2014 There's a difference between surveillance of targets and maintaining internal control of contractors. Snowden exploited internal security gaps and the failure to abide by best practice security guidelines. What's that got to do with the NSA watching "interesting" folks?witty subliminal message Guard your honor, let your reputation fall where it will, and outlast the bastards. 1* Quote Share this post Link to post Share on other sites