Deutsch English Français Italiano |
<1r1fkp0.rr4q3wzkmta7N%snipeco.2@gmail.com> View for Bookmarking (what is this?) Look up another Usenet article |
Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!snipe.eternal-september.org!.POSTED!not-for-mail From: snipeco.2@gmail.com (Sn!pe) Newsgroups: comp.misc,comp.os.linux.advocacy,misc.news.internet.discuss Subject: Re: Security? What "Security"? Date: Mon, 14 Oct 2024 19:31:26 +0100 Organization: Sn!peCo World Wide Wading Birds Lines: 93 Message-ID: <1r1fkp0.rr4q3wzkmta7N%snipeco.2@gmail.com> References: <1r19ri6.xu1j411x9lob6N%snipeco.2@gmail.com> <87y12ueaej.fsf@tilde.institute> <1r1boqa.10mfokh153s31rN%snipeco.2@gmail.com> <87ed4kc02y.fsf@tilde.institute> Reply-To: snipeco.1@gmail.com (Sn!pe) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Injection-Date: Mon, 14 Oct 2024 20:31:27 +0200 (CEST) Injection-Info: snipe.eternal-september.org; posting-host="33717a425bc334b7ebe82e06d4fa87a4"; logging-data="1385341"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+EHvAb1zpzTsMpAcvZHQdy" User-Agent: MacSOUP/2.8.6b1 (ed136d9b90) (Mac OS 10.13.6) Cancel-Lock: sha1:aOqVDStcA3wMnTPYo5/yyb7NY48= X-Validate: All genuine Sn!peCo articles contain the header: "Injection-Info: snipe.eternal-september.org;" my registered FQDN. X-Disclaimer: Any advice that I may give is worth only what I paid for it. This article comprises only my personal opinions unless otherwise stated. May contain traces of nuts. X-Clacks-Overhead: GNU Terry Pratchett; WonK; Large Enid; Lydia Dustbin X-Copyright: Copyright (c) 2024 Sn!peCo WWWB, All Rights Reserved. This article may be reproduced for the purposes of propagation and personal use only, no commercial use without express permission. X-Tongue-In-Cheek: Always X-Face: 5<x+vv{"AHN,F~/dhf,X*~1zNv[TF/WUe(Uw.*ZOw\P'Ju]C6].T~7Z5cVjV\xTO6&)1#VQ iZ4vFDG Bytes: 5383 yeti <yeti@tilde.institute> wrote: > snipeco.2@gmail.com (Sn!pe) wrote: > > > /!\ The following should be read with a mix of panic and a smile; you > decide, what to apply to which parts. > > > > ISTM that a secure payload would need to be encrypted on a stand-alone > > machine, air-gapped and never to be connected online. > > There are many ways even air-gapped systems can or do leak data, that > may leak the keys or partial information about them. > > IMO every system that exists on the same side of the singularities as we > do *is* connected with the rest. It just may be harder to get the data > you want. > > We had leaking CRTs which could be read over a distance, AM leaks using > rhythms of loops while computing, blinking drive LEDs, RPM modulated > fans, ultrasonic connections between laptops in exams, and additionally > we are in the > > __ __ ___ _ _ _____ __ ___ _ _ _ > | \/ |_ _| \| |_ _\ \/ / |_ _|_ _ __(_)__| |___| | > | |\/| || || .` || | > < | || ' \(_-< / _` / -_)_| > |_| |_|___|_|\_|___/_/\_\ |___|_||_/__/_\__,_\___(_) > > > era and I definitely will not bet that ARM and RISCV chips or even FPGAs > don't come "pre-infected" in a comparable way. So who knows which > Gremlins in other chips are able to play e.g. modem over power-line and > whatnot. > > So better assume that every system that is not made exclusively from > logic gates[0] you've baked yourself in your kitchen already comes > infected with spy hard- and software. And thinking about this shouldn't > stop without a look at the power supply[1]. Some leaks still may exist > no matter what you use to build the gates, but at least the foreign > gremlins would stay outside. > > > TL;DR: > __ __ _ _ _ _ _ _ > \ \ / /__( )_ _ ___ __| |___ ___ _ __ ___ __| | | | | > \ \/\/ / -_)/| '_/ -_) / _` / _ \/ _ \ ' \/ -_) _` |_|_|_| > \_/\_/\___| |_| \___| \__,_\___/\___/_|_|_\___\__,_(_|_|_) > Yes, exactly so; I agree that we're doomed (just like always...) ≈:o( I suppose I'll just have to invest in a sound-proofed anechoic chamber inside a Faraday shield and power my stand-alone 'puter with batteries using only left-handed electrons. On the other hand I may just shrug my shoulders and accept that privacy is dead, long dead, and it ain't coming back. As I said at the outset: anything viewable in clear on a networked device is vulnerable to observation and the quality of message encryption is moot, not to say futile. > ____________ > > > [0]: Jeri Makes Integrated Circuits > <https://hackaday.com/2010/03/10/jeri-makes-integrated-circuits/#more-2229 > 0> > > Transistor Fabrication: So Simple A Child Can Do It > <https://hackaday.com/2010/05/13/transistor-fabrication-so-simple-a-c > hild-can-do-it/> > > LLTP - Light Logic Transistorless Processor > <https://hackaday.io/project/172413-lltp-light-logic-transistorless-p > rocessor> > > Mechanical Logic Gates With Amplification > <https://hackaday.com/2024/09/20/mechanical-logic-gates-with-amplific > ation/> > > [1]: Charging An Electric Supercar With Lemons, Kids, And The Sun > <https://hackaday.com/2018/06/29/charging-an-electric-supercar-with-lemons > -kids-and-the-sun/> -- ^Ï^. Sn!pe, VC, PTB, FIBS My pet rock Gordon eagerly awaits the expected socialist paradise.