publication croisée depuis : https://lemmy.world/post/7290317

Hi, I have been having a look at utilising RF and trying to understand how every device around me emits RF.

I recently came across RTL-SDR and HackRF, alongside software like SDR++, TempestSDR, gqrx etc. I know that I can spy on my monitor and record keyboard keys being pressed using RF, but what are some other ways I should be looking at to exploit my digital vulnerabilities, and trying to solve such problems?

Thanks!


Edit: I’m well aware that nothing I’m doing is that interesting to security agencies across the globe. With that said, I’m interested in maintaining my privacy, and this happens to be an avenue I find interesting. Any suggestions on how I can look to do so would be greatly appreciated!

  • @[email protected]
    link
    fedilink
    English
    611 months ago

    If someone wants to get your data that badly, they will threaten you with a hammer long before they waste time with RF sniffing.

    Privacy is important, but you need to be aware of your risk profile, otherwise you’ll end up living in a cave in the woods.

    If your data is really that important, then you should be speaking to your countries version of the NSA, it is their job to safeguard data (along with exposing others data, which leaves them in a bit of a catch-22 position, but they are the experts are protecting their own data)

    • @MigratingtoLemmyOP
      link
      English
      311 months ago

      Thank you, and it is exactly as you say: I’m not doing anything worth any interest to the state. With that said, from what I can see, with just some experience and interest it would be trivial to see what I’m typing on my screen right now and I wouldn’t even know. I’d like to know more about how one can exploit RF, and then learn to secure myself, even if I display blatant signs of unwarranted paranoia in the process.

      • @[email protected]
        link
        fedilink
        English
        311 months ago

        If you just want to learn, read the research:

        https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch19-7sep.pdf

        https://arxiv.org/abs/2308.01074

        Keep in mind that much of the research in this area is under ideal conditions (single target device, otherwise clean environments), and that adding more noise (more “target” devices, white noise on speakers etc) will mitigate most attacks. Ironically, protecting yourself may be as easy as doing your work from a very public place (lan cafe with dozens of active computers, computer lab), you just need to then ensure that you protect yourself from being physically snooped on.

        In terms of protecting yourself, follow what your local NSA does. Build yourself a “SCIF”, an isolated room with sound insulation, and maybe RF insulation. Keep unknown people far away from from this room via physical security (doors, gates, locks, security systems), and only take trusted devices into the room (no phones, bluetooth devices, etc).

        • @MigratingtoLemmyOP
          link
          English
          111 months ago

          Thank you for the material. And I agree with your point, the best idea would probably be to work from a public place with a lot of noise to obscure one’s actions.