User Controls
Posts by Kuntzschutz
-
2020-08-26 at 1:13 AM UTC in what happens when youre a gay autistic wigger, most americans dont know the answer
-
2020-08-26 at 12:32 AM UTC in what happens when youre a gay autistic wigger, most americans dont know the answer
-
2020-08-26 at 12:14 AM UTC in what happens when youre a gay autistic wigger, most americans dont know the answertopic
-
2020-08-25 at 11:44 PM UTC in 1000 German doctors say covid19 is 100% a scam
-
2020-08-25 at 9:12 PM UTC in Better Poster Privilege
Originally posted by Speedy Parker Do Do bird
Yeah, intelligent people like me that prove idiots like you wrong will probably go extinct if we don't exterminate the stupids.
hiding behind dogs is pretty goddamn stupid and pathetic too. all it would take is a couple poison meatballs or darts.
not to mention cowardly to potentially put the dog in harms way -
2020-08-25 at 9 PM UTC in Wariat seriously thinks its cool that he spent time at San Quentin...
-
2020-08-25 at 7:15 PM UTC in Hackers clone keys by listening to pins inside locks
Originally posted by -SpectraL https://arstechnica.com/information-technology/2013/10/meet-badbios-the-mysterious-mac-and-pc-malware-that-jumps-airgaps/
In the following months, Ruiu observed more odd phenomena that seemed straight out of a science-fiction thriller. A computer running the Open BSD operating system also began to modify its settings and delete its data without explanation or prompting. His network transmitted data specific to the Internet's next-generation IPv6 networking protocol, even from computers that were supposed to have IPv6 completely disabled. Strangest of all was the ability of infected machines to transmit small amounts of network data with other infected machines even when their power cords and Ethernet cables were unplugged and their Wi-Fi and Bluetooth cards were removed. Further investigation soon showed that the list of affected operating systems also included multiple variants of Windows and Linux.
"We were like, 'Okay, we're totally owned,'" Ruiu told Ars. "'We have to erase all our systems and start from scratch,' which we did. It was a very painful exercise. I've been suspicious of stuff around here ever since."
In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that's able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine's inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.
Another intriguing characteristic: in addition to jumping "airgaps" designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.
May have something to do with 'radio signals from the dna'
A literal virus or bacteria which transmits a computer virus -
2020-08-25 at 7:09 PM UTC in Hackers clone keys by listening to pins inside locks
In particular, a large number of reports has emerged in recent years claiming that private conversations conducted in the presence of smartphones seemingly resulted in targeted online advertisements. These rumors have not only attracted media attention, but also the attention of regulatory authorities. With regard to explaining the phenomenon, opinions are divided both in public debate and in research.
-
2020-08-25 at 3:30 PM UTC in Hackers clone keys by listening to pins inside locks
Chris1, Roger Lipscombe
"What would battery life look like if the phone was recording audio to an internal buffer"
Don't think battery think very high value "super cap" capacitor of half a farad or more they can keep things running for several days. You find them in lots of comsumer equipment these days to hold charge for Real Time Clocks etc whilst the battery is being charged, Oh and the average rechargable battery is omly good for around 200 charges where as a super cap is good for several thousand. -
2020-08-25 at 3:20 PM UTC in Hackers clone keys by listening to pins inside locks
Originally posted by Speedy Parker Yeah, you're talking above my pay grade. Is there a small battery on the MB like with an x86 CMOS battery?
There's likely something like that in most models, along with the capacitors probably being used for low power applications of the baseband chip when necessary, even with the battery removed.
My memory on all this is a little fuzzy but I recall in older models, due to some property of the electret mics that fell out of favor and the nature of electrostatics, they were able to extract info directly from those mics without a battery. They're of course using something else now.
Spectral is more accustomed to xlr mics and thinking in terms of music recording.
'mic sensitivity' is a rather broad term. Microphone specs can be a
bit complex.If you Google a diy project called 'ultra sensitive spy ear' you'll notice it's quite powerful and has quite a range even with a cheap mic like would be used in a smartphone. More than enough to pic up the sounds of pins/tumblers.
I can hear the individual pins colliding with the teeth on the key with just my ears from a few feet away so add a decent amplifier(as you'd find on the phones motherboard) and the appropriate filtters, and a mic on a smartphone is more than adequate for this purpose.
Most people assume these mics aren't sensitive enough, but again, it's a matter of software, not hardware. There's a tutorial somewhere for bypassing these restrictions to get amazing audio quality and range from smartphone mics.
Also:I never had any actual evidence one way or the other, but the technique has surfaced in an organized crime prosecution:
The surveillance technique came to light in an opinion published this week by U.S. District Judge Lewis Kaplan. He ruled that the "roving bug" was legal because federal wiretapping law is broad enough to permit eavesdropping even of conversations that take place near a suspect's cell phone.
Kaplan's opinion said that the eavesdropping technique "functioned whether the phone was powered on or off." Some handsets can't be fully powered down without removing the battery; for instance, some Nokia models will wake up when turned off if an alarm is set. -
2020-08-25 at 4:22 AM UTC in Hackers clone keys by listening to pins inside locks
Originally posted by Speedy Parker There have been many stories and videos on this. The GPS tracker even works with the battery removed.
That's partly because the software is designed to make the person think the motherboard has no power when the battery either appears dead or is removed.
Rf illumination actually is rather unique to the manufacturing process, so illuminating the loudspeaker, for example, with battery removed, will still have enough data to uniquely ID a device. You could take 200 phones with same model etc , but as with radio fingerprinting, it's unique to each phone.
Edit, most rfi for radio fingerprinting a device is under 1mhz, and at these long wavelength/low frequency, that rfi travels very far, with miniscule power required -
2020-08-25 at 4:17 AM UTC in Hackers clone keys by listening to pins inside locksFYI, rf illumination at 2.4 GHz and 1900 packets per second can pick up audio from a very good distance via loudspeaker, with no battery in the phone necessary.
Google it if you need to. The mics also catch way more audio than you'd think but the baseband os and adc strips a lot away. Depending on frequency, as with radio, lower frequency travels further.
The speaker and end user software may hide a lot from lay people, but there's a wealth of info if you know how to access it -
2020-08-25 at 4:11 AM UTC in Hackers clone keys by listening to pins inside locks
-
2020-08-25 at 4:10 AM UTC in Hackers clone keys by listening to pins inside locks
Originally posted by -SpectraL A smartphone mic wouldn't be good enough to pick up the tumblers.
That's false actually. It's what I'd think too, but with control of the analog to digital converter and baseband chips operating system, ads are customized towards even the quietest conversations people have via that mic. I have discussed this with friends who have direct links to upper echelon in US national security, and I had to explain to them, even putting the phone under a pillow won't stop the recording
Not even taking the battery out will. I've posted about all this research here before. -
2020-08-25 at 4:04 AM UTC in Better Poster Privilege
Originally posted by gadzooks I'm not even a libcuck.
Everything you post regarding politics says otherwise, and don't pretend you have the balls to break any laws beyond drug abuse.
But I'll commit identity fraud and vote ten times for a liberal candidate just out of spite.
Don't worry though, you remind me of most Canadians, like the one they interviewed when that crazy Asian guy cut the dudes head off on a train in Canada. All fighting aged Canadian males in that incident ran away like scared little bitches rather than trying to stop the guy.
The one interviewed was a pretty boy like you and he had this incredibly pathetic emo/ptsd expression on his face.
No wonder your country is a liberal cesspit of degeneracy the way spectral described -
2020-08-25 at 3:58 AM UTC in Better Poster Privilege
Originally posted by Speedy Parker Money buys choices. More choices equals more freedom. More freedom coupled with the right choices brings happiness and often more money. It's a self perpetuating upward spiral if you learn to ride it without falling off. But you can't get out the door and down the street without training wheels and a Barney helmet.
Not counting the fact most poor people have been robbed before they were even born -
2020-08-25 at 3:57 AM UTC in Better Poster Privilege
-
2020-08-25 at 3:55 AM UTC in Better Poster Privilege
Originally posted by Misguided Russian Measure poster quality by posts/ thanks ratio.
That's retarded and you know it, due to the amount of circle jerking and people(and governments) thanking themselves with alts. The majority of thanks don't go to intellectual or informative posts but rather those displaying slapstick style humor and snoody comments -
2020-08-25 at 3:51 AM UTC in Better Poster Privilege
-
2020-08-24 at 11:54 PM UTC in Hackers clone keys by listening to pins inside locks
Originally posted by Speedy Parker If you are close enough to my locks to hear them you are going to get shot if you don't your leg eaten first.
The article mentions hijacking the targets smartphone mic. I don't see it being overly practical without doing that or being across the street with a parabolic mic.
You could also toss an fm transmitter + amplifier near the lock.
Edit, with a transmitter + amplifier, it may pick up the noise from roughly 40 feet away, maybe a bit more