publication croisée depuis : https://lemmy.world/post/7290317

Hi, I have been having a look at utilising RF and trying to understand how every device around me emits RF.

I recently came across RTL-SDR and HackRF, alongside software like SDR++, TempestSDR, gqrx etc. I know that I can spy on my monitor and record keyboard keys being pressed using RF, but what are some other ways I should be looking at to exploit my digital vulnerabilities, and trying to solve such problems?

Thanks!


Edit: I’m well aware that nothing I’m doing is that interesting to security agencies across the globe. With that said, I’m interested in maintaining my privacy, and this happens to be an avenue I find interesting. Any suggestions on how I can look to do so would be greatly appreciated!

  • @[email protected]
    link
    fedilink
    English
    61 year ago

    If someone wants to get your data that badly, they will threaten you with a hammer long before they waste time with RF sniffing.

    Privacy is important, but you need to be aware of your risk profile, otherwise you’ll end up living in a cave in the woods.

    If your data is really that important, then you should be speaking to your countries version of the NSA, it is their job to safeguard data (along with exposing others data, which leaves them in a bit of a catch-22 position, but they are the experts are protecting their own data)

    • @MigratingtoLemmyOP
      link
      English
      31 year ago

      Thank you, and it is exactly as you say: I’m not doing anything worth any interest to the state. With that said, from what I can see, with just some experience and interest it would be trivial to see what I’m typing on my screen right now and I wouldn’t even know. I’d like to know more about how one can exploit RF, and then learn to secure myself, even if I display blatant signs of unwarranted paranoia in the process.

      • @[email protected]
        link
        fedilink
        English
        31 year ago

        If you just want to learn, read the research:

        https://www.cl.cam.ac.uk/~rja14/Papers/SEv3-ch19-7sep.pdf

        https://arxiv.org/abs/2308.01074

        Keep in mind that much of the research in this area is under ideal conditions (single target device, otherwise clean environments), and that adding more noise (more “target” devices, white noise on speakers etc) will mitigate most attacks. Ironically, protecting yourself may be as easy as doing your work from a very public place (lan cafe with dozens of active computers, computer lab), you just need to then ensure that you protect yourself from being physically snooped on.

        In terms of protecting yourself, follow what your local NSA does. Build yourself a “SCIF”, an isolated room with sound insulation, and maybe RF insulation. Keep unknown people far away from from this room via physical security (doors, gates, locks, security systems), and only take trusted devices into the room (no phones, bluetooth devices, etc).

        • @MigratingtoLemmyOP
          link
          English
          11 year ago

          Thank you for the material. And I agree with your point, the best idea would probably be to work from a public place with a lot of noise to obscure one’s actions.

  • @[email protected]
    link
    fedilink
    English
    51 year ago

    TEMPEST style attacks are not practical outside of anechoic chamber because while your screen emits some radiation that does contain some data, so does everything else. Don’t bother too much about it

    • @MigratingtoLemmyOP
      link
      English
      01 year ago

      Thanks, but would it be very hard to pinpoint the frequency at which the signals from the HDMI cable connected to my monitor are being emitted? Also, could one track/snoop on wireless keyboards using RF?

      • @sramder
        link
        English
        31 year ago

        Like others said TEMPEST style attacks are possible but more of a novelty. It’s a much noisier world now.

        Take a look at the NSA ANT catalogue that was leaked about 10 years back for more current thinking on exfiltrating people’s data.

        Pick up a flipper-0 and play around. There’s a ton of insecure wireless keyboards/mice… it was almost a foot-note in one of the DEFCON videos I watched last month. Unfortunately I’m not sure which video :-)

        There were several videos from this year’s conference on similar subjects, reverse engineering the Fasttrack system is probably a good ~1 hour way to start wrapping your head around the work involved.

        • @MigratingtoLemmyOP
          link
          English
          21 year ago

          Thanks for pointing me towards the NSA ANT material, I’ll have a look!

          I have been watching a few DefCon videos myself, and they have been quite entertaining so far. I had never heard of a flipper-0 before this either. Thanks for the tip on Fast track too!

          • @sramder
            link
            English
            31 year ago

            Have fun, play safe, think about a ham license. It’s a good way to meet other experimenters with relevant experience.