• Jessica@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      43
      ·
      3 days ago

      That is amazing. The x-ray of it is kind of scary, honestly. That little chip could be all it would take to get into an air-gapped machine.

      • Bad_Engineering@fedia.io
        link
        fedilink
        arrow-up
        17
        ·
        3 days ago

        There are a ton of different payloads that can be run on these, for everything from simple keylogging, to root access, to network backdoors. I’ve only recently gotten into pentesting but with something like this there’s no real limit to the damage that could be done with only a few seconds of physical access.

        • thejml@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          22
          ·
          3 days ago

          Honestly, as a Systems/DevOps engineer it’s always been well know that if you have physical access, you have zero chance of security. Sure it might take more time if precautions were followed, but you will be owned eventually, that’s guaranteed.

          • Dubiousx99@lemmy.world
            link
            fedilink
            English
            arrow-up
            10
            ·
            3 days ago

            This is one of our most frustrating fights I have with our security design reviewers. Effectively functionless mitigations that create extra obstacles for our service reps to deal with during troubleshooting. One example is our equipment is installed in access restricted areas, in a locked rack. We don’t need to disable unused Ethernet ports on our networking equipment that exists in a locked cabinet and it will take away our ability to repatch equipment to a different switch in the system to assist in troubleshooting.

    • dance_ninja@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      ·
      edit-2
      3 days ago

      Crazy that the USB-A housing is big enough for that. Makes me want to avoid anything that’s not C to C.

      Edit: someone pointed out there’s an option for C to C 💀

    • d-RLY?@lemmy.ml
      link
      fedilink
      English
      arrow-up
      4
      ·
      2 days ago

      Came to check if anyone had already linked hak5. Glad to see you had shared the link!

    • Salamanderwizard@lemmy.world
      link
      fedilink
      English
      arrow-up
      8
      ·
      2 days ago

      The government is that dude who’ll talk a big game about how great he is, get ya in bed, fuck you and not even finger blast ya to the finish.

        • d-RLY?@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          ·
          2 days ago

          Maybe, might also be that since tech literacy has degraded since his leak. Which means that they don’t care because they are overwhelmed with the information that they don’t understand. Hell, I imagine that a lot of the press that where sent the information didn’t fully understand.

          The average person likely defaulted to what they always do, and just assumed that the leak meant the feds had to stop and treat it like any other historic reveal (example being stuff like COINTELPRO and believing that it was bad but isn’t done anymore). Hell, a shocking amount of libs honestly thought that Biden was going to bring Medicare for All (even though he said he wasn’t) just because he said “the Democratic Party is the party of healthcare” a few times.

          • chillpanzee@lemmy.ml
            link
            fedilink
            English
            arrow-up
            3
            ·
            2 days ago

            I’m sure it’s a spectrum, and some people may legitimately not be aware, but its been 13 years. As a society, we’ve had ample time to get literate and develop knowledge. Instead we’ve had three presidents from both major parties hold the line that Snowden was a criminal for blowing the whistle on rampant illegal surveillance, and all 3 of them just stepped on the gas.

            Voters don’t even see the irony in the pedophiles’ ramping up the surveillance apparatus in the name of protecting the children.

    • Tollana1234567@lemmy.today
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      2
      ·
      2 days ago

      assange, chelsea manning, the msm crucified these 2 as well. funny enough putin allows him to stay because hes useful propaganda.

      • in_my_honest_opinion@piefed.social
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 days ago

        I wouldn’t include Assange in that list honestly. He was just out for himself in the end as he did muddy the waters in the 2016 election and was easily cajoled by the FSB to leak falsified documents and misinformation.

        Chelsea however was a fucking patriot who was pillaried by the state to be made example of. She literally did her patriotic duty and was imprisoned for it.

  • YiddishMcSquidish@lemmy.today
    link
    fedilink
    English
    arrow-up
    30
    ·
    2 days ago

    This is pretty much the reason I exclusively use dollar store cables and/or dedicated chargers. Saw a yt video about these things at an airport. The more I learn about tech, the more it makes me wanna uncle Ted the fuck out.

      • muusemuuse@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        10
        ·
        edit-2
        2 days ago

        I do call center work in a health care environment. We get lots of scams. Most of them are bad and obvious but someone recently did the math and figured out the don’t need to be good to work.

        Follow me for a moment.

        Call comes in. It’s a recording. You know this recording. It’s a busy office environment. Paper rustling, typing, annoyed sigh exactly the same number of seconds in every call.

        There is no response to your voice. But you have to say the same thing 3 times with no response before you can disconnect the call. So the recoding loops and you continue talking to the bot.

        Why?

        Well on my side, I know it’s dumb but I have to do it because metrics mean I can continue to almost afford to do things like eat food or masturbate in a warm house in the winter.

        They do it because this bot lets them map out our IVR (whatever, it sucks now that it’s AI) and capture voice samples from people who are forbidden to hang up.

        Now in years past this wouldn’t be all that useful. The samples are of reps saying basically the same damn thing. But we now live in the era of lifeless AI. So the bar has been lowered for what a legit interaction is. (Seriously, some places paid extra for a more “lifelike” AI that did everything the old EVA bot did but in an Indian accent with the sound of crumpling paper in the background and the occasional “um” thrown in.)

        So those voice samples can be used to create a fake call center based on real employee voices. This is a known attack vector that is being used against us in health care right NOW.

        But AI needs to profitable so nothing is done about it.

        Seriously, they protect AI to such a ridiculous extent they know the scam is happening from the same phone number and they won’t block it or even issue it a challenge.

      • YiddishMcSquidish@lemmy.today
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        Bruh, real talk! I did some limited packet tracking. But going deep I learned about the occilation of the fan attack on air gapped machines a few years ago. I’m just done at this point. They gunna get your info regardless.

    • Bunitonito@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 days ago

      If you’re really paranoid you should buy all your stuff in a brick and mortar store. You’d have to be high up on a list for it to even be worth someone’s time, but intercepting a package and swapping the contents is pretty easy to do, typical Tuesday multi-agency gun ring bust for some postal inspectors

      • My older brother is abusive, and I need precautions to be safe.

        That’s my threat model.

        I actually would rather run a phone with stock OS with verified boot, rather than LineageOS but with bootloader unlocked. Evil Maid from someone you know wanting fuck around with you is more scary to me than government tbh

        (I don’t have a pixel for graphene)

        Edit: Also these cables cost like $200 online from HAK5. My brother definitely can pull some shit if he tried. He’s in Computer Science in college.

          • Only with a few rare phones… most phones just gets bricked if you attempt to lock it under a custom os because they don’t support custom keys.

            Pixel supports it, but I don’t have a pixel. (If I did I would just use Graphene lol)

            New is expensive

            and I really distrust the used market… feels very sketchy and it could have hidden damage that doesn’t manifest itself until the return window is already passed (if they even allow a return at all), also I have a paranoia about getting an IMEI that a criminal have used and then cops come knocking thinking its ME doing the illegal activity (cuz you know they do the “oops wrong address” thing often and they’ve shot people to death over it )

  • Itdidnttrickledown@lemmy.world
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    2 days ago

    Any government and crooks as well. Its been possible a lot longer than fifteen years.

    Compromising computers with tech is nearly as old as computers themselves. The wireless aspect makes it more convenient but in no way is doing so new.