1 |
On Thu, Aug 7, 2014 at 9:06 AM, Lie Ryan <lie.1296@×××××.com> wrote: |
2 |
<SNIP> |
3 |
> |
4 |
> Also, did you apply the same level of scrutiny to your hardware? |
5 |
> |
6 |
|
7 |
That's the basis of the now well known NSA hack on Cisco routers. |
8 |
Intercept the box, modify the hardware, send the box onto some foreign |
9 |
land and the router lets them in. No hacking required. |
10 |
|
11 |
> For the truly paranoid, I recommend unplugging. |
12 |
> |
13 |
|
14 |
In the aforementioned book that's pretty much exactly what Snowden |
15 |
required of the reporter & documentary film maker he started out |
16 |
disclosing the info to. They had to buy new laptops and never attach |
17 |
them to the net. He apparently used PGP encryption to chat & transfer |
18 |
files over normal nets but (as I understand it) the encrypted files |
19 |
are never opened on anything other than your off-the-net machine. |
20 |
|
21 |
Of course, according to Snowden the NSA can enable the microphone on |
22 |
my cell phone and listen to me talking in the house. He required |
23 |
batteries be removed or cell phones be placed in a freezer. |
24 |
|
25 |
I recently saw a similar story about new TVs having built in cameras |
26 |
(for game interfaces I suppose) which could be enabled over the net to |
27 |
watch what's going on in my living room. If the TV has power applied, |
28 |
even if I'm not using it, what do I know really about what it's doing? |
29 |
|
30 |
All of that argues for Max's suggestion about sniffing the network |
31 |
full time, assuming I can relay on the sniffer not being hacked... ;-) |