• Laptop Privacy

    From rek2 hispagatos@rek2@hispagatos.org.invalid to hispagatos.talk,alt.2600,alt.2600.madrid,alt.2600.hackers on Monday, December 30, 2024 21:04:01
    From Newsgroup: alt.2600


    ** Making Laptops Invisible To Tracking / Attackers **

    https://odysee.com/@RTP:9/laptop-removing_mic_ble_wifi:5

    How to remove microphone, bluetooth, WiFi, webcam / camera on your
    laptop. Follow for any similar laptop model, once you find the placement
    of the microphone, bluetooth, wifi, camera. This video uses a Lenovo
    Thinkpad X230 for our example machine. An attacker cannot gain access
    without psysical, or remote access hardware on a machine (most have no
    clue about SC attacks).

    We know (example: stories like pegasus) our hardware can potentially be
    turned against us when malware strikes.

    If our devices acquire said malware, a few key pieces of hardware could
    be EASILY turned against us (and others, but this is most common):

    Our microphone can be turned into a hidden bug in our home. Our webcams
    can be used a surveillance cameras to watch our every move when the
    laptop lid is open. Our WiFi / bluetooth devices send out radio beacons, sharing everything from signal strength to narrow down location, all the
    way to details on our pattern of life (bssid tracking). And if
    compromised, could even allow for other types of data / compromise
    smuggling. Without the above hardware devices, without networking, our
    devices are much less easily tracked - almost invisible... though there
    are other types of unique fingerprint, as we will continue covering on
    this channel.

    FOR SECURITY BENEFIT:

    This also brings into play great security benefits - so much in targeted attacks rely upon prediction of target behavior / accessibility.

    From finding devices to compromise, to opening remote backdoors. Your
    hardware network / wireless devices can easily be turned against you.

    Without networking / wireless access, attacks are much less likely (but
    not impossible if you give someone physical access / other means).

    By removing these, we take greatly reduce accessibility for the 'bad
    guys'.


    Happy Hacking
    ReK2
    --
    - {gemini,https}://{,rek2.}hispagatos.org - mastodon: @rek2@hispagatos.space
    - [https|gemini]://2600.Madrid - https://hispagatos.space/@rek2
    - https://keyoxide.org/A31C7CE19D9C58084EA42BA26C0B0D11E9303EC5
    --- Synchronet 3.20a-Win32 NewsLink 1.114