Deutsch   English   Français   Italiano  
<1r1fkp0.rr4q3wzkmta7N%snipeco.2@gmail.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!snipe.eternal-september.org!.POSTED!not-for-mail
From: snipeco.2@gmail.com (Sn!pe)
Newsgroups: comp.misc,comp.os.linux.advocacy,misc.news.internet.discuss
Subject: Re: Security?  What "Security"?
Date: Mon, 14 Oct 2024 19:31:26 +0100
Organization: Sn!peCo World Wide Wading Birds
Lines: 93
Message-ID: <1r1fkp0.rr4q3wzkmta7N%snipeco.2@gmail.com>
References: <1r19ri6.xu1j411x9lob6N%snipeco.2@gmail.com> <87y12ueaej.fsf@tilde.institute> <1r1boqa.10mfokh153s31rN%snipeco.2@gmail.com> <87ed4kc02y.fsf@tilde.institute>
Reply-To: snipeco.1@gmail.com (Sn!pe)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 14 Oct 2024 20:31:27 +0200 (CEST)
Injection-Info: snipe.eternal-september.org; posting-host="33717a425bc334b7ebe82e06d4fa87a4";
	logging-data="1385341"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+EHvAb1zpzTsMpAcvZHQdy"
User-Agent: MacSOUP/2.8.6b1 (ed136d9b90) (Mac OS 10.13.6)
Cancel-Lock: sha1:aOqVDStcA3wMnTPYo5/yyb7NY48=
X-Validate: All genuine Sn!peCo articles contain the header:
 "Injection-Info: snipe.eternal-september.org;" my registered FQDN.
X-Disclaimer: Any advice that I may give is worth only what I paid for it.
 This article comprises only my personal opinions unless otherwise stated.
 May contain traces of nuts.
X-Clacks-Overhead: GNU Terry Pratchett; WonK; Large Enid; Lydia Dustbin
X-Copyright: Copyright (c) 2024 Sn!peCo WWWB, All Rights Reserved.
 This article may be reproduced for the purposes of propagation and
 personal use only, no commercial use without express permission.
X-Tongue-In-Cheek: Always
X-Face: 5<x+vv{"AHN,F~/dhf,X*~1zNv[TF/WUe(Uw.*ZOw\P'Ju]C6].T~7Z5cVjV\xTO6&)1#VQ
 iZ4vFDG
Bytes: 5383

yeti <yeti@tilde.institute> wrote:

> snipeco.2@gmail.com (Sn!pe) wrote:
> 
> 
> /!\ The following should be read with a mix of panic and a smile; you
>     decide, what to apply to which parts.
> 
> 
> > ISTM that a secure payload would need to be encrypted on a stand-alone
> > machine, air-gapped and never to be connected online.
> 
> There are many ways even air-gapped systems can or do leak data, that
> may leak the keys or partial information about them.
> 
> IMO every system that exists on the same side of the singularities as we
> do *is* connected with the rest.  It just may be harder to get the data
> you want.
> 
> We had leaking CRTs which could be read over a distance, AM leaks using
> rhythms of loops while computing, blinking drive LEDs, RPM modulated
> fans, ultrasonic connections between laptops in exams, and additionally
> we are in the
> 
>  __  __ ___ _  _ _____  __  ___         _    _     _ 
> |  \/  |_ _| \| |_ _\ \/ / |_ _|_ _  __(_)__| |___| |
> | |\/| || || .` || | >  <   | || ' \(_-< / _` / -_)_|
> |_|  |_|___|_|\_|___/_/\_\ |___|_||_/__/_\__,_\___(_)
> 
> 
> era and I definitely will not bet that ARM and RISCV chips or even FPGAs
> don't come "pre-infected" in a comparable way.  So who knows which
> Gremlins in other chips are able to play e.g. modem over power-line and
> whatnot.
> 
> So better assume that every system that is not made exclusively from
> logic gates[0] you've baked yourself in your kitchen already comes
> infected with spy hard- and software.  And thinking about this shouldn't
> stop without a look at the power supply[1].  Some leaks still may exist
> no matter what you use to build the gates, but at least the foreign
> gremlins would stay outside.
> 
> 
> TL;DR:
> __      __   _              _                       _ _ _ _ 
> \ \    / /__( )_ _ ___   __| |___  ___ _ __  ___ __| | | | |
>  \ \/\/ / -_)/| '_/ -_) / _` / _ \/ _ \ '  \/ -_) _` |_|_|_|
>   \_/\_/\___| |_| \___| \__,_\___/\___/_|_|_\___\__,_(_|_|_)
> 

Yes, exactly so; I agree that we're doomed (just like always...)   ≈:o(

I suppose I'll just have to invest in a sound-proofed anechoic chamber
inside a Faraday shield and power my stand-alone 'puter with batteries
using only left-handed electrons.

On the other hand I may just shrug my shoulders and accept that 
privacy is dead, long dead, and it ain't coming back.

As I said at the outset:  anything viewable in clear on a networked
device is vulnerable to observation and the quality of message
encryption is moot, not to say futile.



> ____________
> 
> 
> [0]: Jeri Makes Integrated Circuits
> <https://hackaday.com/2010/03/10/jeri-makes-integrated-circuits/#more-2229
> 0>
> 
>      Transistor Fabrication: So Simple A Child Can Do It
>      <https://hackaday.com/2010/05/13/transistor-fabrication-so-simple-a-c
>      hild-can-do-it/>
> 
>      LLTP - Light Logic Transistorless Processor
>      <https://hackaday.io/project/172413-lltp-light-logic-transistorless-p
>      rocessor>
> 
>      Mechanical Logic Gates With Amplification
>      <https://hackaday.com/2024/09/20/mechanical-logic-gates-with-amplific
>      ation/>
> 
> [1]: Charging An Electric Supercar With Lemons, Kids, And The Sun
> <https://hackaday.com/2018/06/29/charging-an-electric-supercar-with-lemons
> -kids-and-the-sun/>


-- 
^Ï^.    Sn!pe, VC, PTB, FIBS

My pet rock Gordon eagerly awaits the expected socialist paradise.