User Controls

Hackers clone keys by listening to pins inside locks

  1. #21
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by Kuntzschutz That's partly because the software is designed to make the person think the motherboard has no power when the battery either appears dead or is removed.

    Rf illumination actually is rather unique to the manufacturing process, so illuminating the loudspeaker, for example, with battery removed, will still have enough data to uniquely ID a device. You could take 200 phones with same model etc , but as with radio fingerprinting, it's unique to each phone.

    Edit, most rfi for radio fingerprinting a device is under 1mhz, and at these long wavelength/low frequency, that rfi travels very far, with miniscule power required

    Yeah, you're talking above my pay grade. Is there a small battery on the MB like with an x86 CMOS battery?
  2. #22
    -SpectraL coward [the spuriously bluish-lilac bushman]
    A microphone on a smartphone is shit. It certainly isn't going to pick up the sound of tumblers.
  3. #23
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by -SpectraL A microphone on a smartphone is shit. It certainly isn't going to pick up the sound of tumblers.
    Mine was able to pick up the sound of the balloon that launched after us whenever it fired it's burner about 2000 feet below. Is that bad?
  4. #24
    Soyboy 2020 IV: Intravenous Soyposting African Astronaut [scrub the quick-drying deinonychus]
    Originally posted by aldra I'm surprised phone microphones are sensitive enough, though it's possible they're not and it's just the dailymail sensationalising things

    The theory is valid though, the main blocker is effective data processing algorithms, which may (but probably won't - in any practical sense) be solvable with neural nets.
  5. #25
    Wariat Marine/Preteen Biologist
    https://hackernoon.com/
  6. #26
    Kuntzschutz African Astronaut
    Originally posted by Speedy Parker Yeah, you're talking above my pay grade. Is there a small battery on the MB like with an x86 CMOS battery?

    There's likely something like that in most models, along with the capacitors probably being used for low power applications of the baseband chip when necessary, even with the battery removed.

    My memory on all this is a little fuzzy but I recall in older models, due to some property of the electret mics that fell out of favor and the nature of electrostatics, they were able to extract info directly from those mics without a battery. They're of course using something else now.

    Spectral is more accustomed to xlr mics and thinking in terms of music recording.

    'mic sensitivity' is a rather broad term. Microphone specs can be a
    bit complex.If you Google a diy project called 'ultra sensitive spy ear' you'll notice it's quite powerful and has quite a range even with a cheap mic like would be used in a smartphone. More than enough to pic up the sounds of pins/tumblers.

    I can hear the individual pins colliding with the teeth on the key with just my ears from a few feet away so add a decent amplifier(as you'd find on the phones motherboard) and the appropriate filtters, and a mic on a smartphone is more than adequate for this purpose.

    Most people assume these mics aren't sensitive enough, but again, it's a matter of software, not hardware. There's a tutorial somewhere for bypassing these restrictions to get amazing audio quality and range from smartphone mics.

    Also:
    I never had any actual evidence one way or the other, but the technique has surfaced in an organized crime prosecution:

    The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.

    Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set.
    The following users say it would be alright if the author of this post didn't die in a fire!
  7. #27
    Kuntzschutz African Astronaut
    Chris1, Roger Lipscombe

    "What would battery life look like if the phone was recording audio to an internal buffer"

    Don't think battery think very high value "super cap" capacitor of half a farad or more they can keep things running for several days. You find them in lots of comsumer equipment these days to hold charge for Real Time Clocks etc whilst the battery is being charged, Oh and the average rechargable battery is omly good for around 200 charges where as a super cap is good for several thousand.
  8. #28
    -SpectraL coward [the spuriously bluish-lilac bushman]
    https://arstechnica.com/information-technology/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/

    In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.

    "We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since."

    In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.

    Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.
  9. #29
    Kuntzschutz African Astronaut
    In particular, a large number of reports has emerged in recent years claiming that private conversations conducted in the presence of smartphones seemingly resulted in targeted online advertisements. These rumors have not only attracted media attention, but also the attention of regulatory authorities. With regard to explaining the phenomenon, opinions are divided both in public debate and in research.
  10. #30
    Kuntzschutz African Astronaut
    Originally posted by -SpectraL https://arstechnica.com/information-technology/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/

    In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.

    "We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since."

    In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.

    Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.

    May have something to do with 'radio signals from the dna'

    A literal virus or bacteria which transmits a computer virus
  11. #31
    Kuntzschutz African Astronaut
    https://niggasin.space/post/653529
  12. #32
    stl1 Cum Lickin' Fagit
    Originally posted by Speedy Parker If you are close enough to my locks to hear them you are going to get shot if you don't your leg eaten first.



    Speedy is just advertising for a guy who wants to get close to the locks of hair on his head...and elsewhere.
  13. #33
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Originally posted by stl1 Speedy is just advertising for a guy who wants to get close to the locks of hair on his head…and elsewhere.

    Maybe he just likes to shoot people.
  14. #34
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by stl1 Speedy is just advertising for a guy who wants to get close to the locks of hair on his head…and elsewhere.

    Why do the liberals alwasy break out the gay sex insults? I thought your side was tolerant. hmmm... Sounds like you are bashing gays.
    The following users say it would be alright if the author of this post didn't die in a fire!
  15. #35
    Soyboy 2020 IV: Intravenous Soyposting African Astronaut [scrub the quick-drying deinonychus]
    Originally posted by Speedy Parker Why do the liberals alwasy break out the gay sex insults? I thought your side was tolerant. hmmm… Sounds like you are bashing gays.

    I'd also like to know this.

    These people are far too interested in what I'm doing with my schlong.
    The following users say it would be alright if the author of this post didn't die in a fire!
  16. #36
    -SpectraL coward [the spuriously bluish-lilac bushman]
    Liberals are really sexual freaks at their core. Diddlers, rapists, animal fuckers, .. you name it.. they'll be a liberal.
  17. #37
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by MORALLY SUPERIOR BEING 2020 IV: Intravenous Soyposting I'd also like to know this.

    These people are far too interested in my schlong.

    FTFY
    The following users say it would be alright if the author of this post didn't die in a fire!
  18. #38
    Kuntzschutz African Astronaut
    So, "in the air", no significant modification of your radio waveform will happen.

    "In your electronics" is a completely different thing, though. Ceramic capacitors, especially high-density ones, are subject to microphonic effects. These are used everywhere, for example in the voltage stabilization of RF amplifiers inside your phone (though potentially indirectly).

    If you charge a capacitor up to certain voltage, and then disconnect it, it will hold that voltage. If you then measure the voltage, and apply vibrations to the capacitor, you'll see these vibrations in the voltage across it. It's a well-known effect, and there's even types of microphones that are based on this principle.

    Now, if you're building sensitive measurement equipment, you'll do your best to shield it from such vibrations. In a smartphone, you've got no chance whatsoever, and have to live with them.


    it would seem it may be possible to extract audio from a smartphones' capacitor, so audio can be recovered even when the microphone is damaged or removed, by measuring the 'vibrations in the voltage'.

    another way to do it without the battery, perhaps.
Jump to Top