[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord


File: 1681485277429.jpg ( 62.53 KB , 900x500 , ancient comp.jpg )

 No.12079

I'll start with a few examples:

>Proprietary Software can be secure

This is a slight of hand. In theory proprietary Software can of course be secure, but in praxis there is no way for you to find out which proprietary software is or isn't secure. So from the perspective of the user proprietary software can't be considered secure because there's no reliable way to tell.

>Proprietary Software is harder to hack because the source-code isn't open

This is a security by obscurity fallacy, that for some inexplicable reason is still in circulation. Exploitable software bugs are usually found by examining the behavior of executable binaries not the source code.

>Open source is secure

Not by default, there is no automatic security-magic in publishing code on git-hub/lab. However open-sourcing code means that it can be subjected to broad public scrutiny and hence it becomes possible for the users to know which software is or isn't secure.

>Security and privacy are not the same

This fallacy is widely parroted even by the security community. You, the human is a part of your computer security, without privacy, attackers can potentially learn enough about you to figure out psychological hacks to compromise your computer security by tricking you.

>Unbreakable cryptography

This is usually wrong in praxis because it doesn't factor in that most people will give up their cypher-key after the "low-tech-biological-deciphering-algorithm" broke their pinky-finger. Cryptography can only be considered secure if the encrypted-data-vault is obfuscated as random bits on a storage medium so that the existence of the encrypted data can be denied.
>>

 No.12327

File: 1690265735601.png ( 552.41 KB , 522x509 , 0.png )

>wireless cameras provide greater security
actually are a negative since most security cameras arent updated regularly if at all. also are infamous for having live feeds on obscure websites. recommend getting dummy cameras instead
>>

 No.12330

File: 1690498212528.jpg ( 42.41 KB , 586x481 , 1688792113424347.jpg )

>>12327
Anything wireless being secure is a myth. Wireless utilities like wifi and Bluetooth use radio frequencies to broadcast data openly. Even if it's encrypted most of the time as has been shown over and over again current encryption standards are trivial to break with enough computing power and dedication.

I never use anything wireless unless I absolutely have to, or, it's something fairly trivial like a controller or something.
>>

 No.12331

>>12079
>It is impossible to find out your location just by listening to your microphone
>>

 No.12346

>>12331
So in order to really turn off a smartphone you have to put it into a metal box to block radio signals. That box also needs a random motion vibrator to fool the accelerometer and a small speaker that's generating white-noise to drown out the surrounding audio-signature.

Am i missing something ?
>>

 No.12353

>>12346
>Am i missing something ?
Yes. It was done not with a smartphone but a stationary PC.
>>

 No.12356

>>12353
>stationary PC.
So a desktop box ?

Assuming the user hasn't plugged in a mic or a low impedance headphone, what are you using as microphone ?

Those cheapy speaker boxes that people usually use, have classD amps, while, efficient, low cost with reasonable audio fidelity, they have a terribly high noise-floor. I doubt that you can get usable audio capture from that.
A class-D amplifier or switching amplifier is an electronic amplifier in which the amplifying devices (usually MOSFETs) operate as electronic switches, and not as linear gain devices as in other amplifiers. They operate by rapidly switching back and forth between the supply rails, using pulse-width modulation and pulse-density modulation to produce a pulse train output.

That leaves the motherboard-beeper, which usually is just a piezo connected to a 5v IO pin that goes high-low-high-low square-wave at 500Hz. Can you get audio capture from that ?
>>

 No.12358

>>12330
You need to ascend anon, for your home wifi you need to disable the password, then set up some utility to clear up/reset the IP connection logs daily, and now you have plausible deniability on any download/connection that you make from your house

So far as phones and etc, ofc it is all fucked, but you can set up your home connection to be quite resilient against your internet provider snooping on you
>>

 No.12359

>>12346

You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there

You need then to research your phone model to see if you can disable the GPS and other things. But at these points the weakpoint stops being you, and it becomes wherever other retard that still uses whatsapp you are working with to setup the coup detat/assassination/thievery etc
>>

 No.12362

>>12359
>You can just desolder the microphones/speakers (they have more than one), Snowden has got some youtube videos showing how it is done. Then if you want to have phonecalls you just plug in a set of earbuds and talk through there
Interesting stuff

>to setup the coup detat/assassination/thievery etc

Lol imagine announcing a coup d'état by using phones, rather than couriers. Even technically super sophisticated spy agencies don't trust their communication technology for the sensitive parts of their operations.

Unique IPs: 7

[Return][Catalog][Top][Home][Post a Reply]
Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / music / 777 / posad / i / a / R9K / dead ] [ meta ]
ReturnCatalogTopBottomHome