[ / / / / / / / / / / / / / ] [ dir / cyber / eah / f / fapioh / just / pdfs / senran / sfw ][Options][ watchlist ]

/tech/ - Technology

You can now write text to your AI-generated image at https://aiproto.com It is currently free to use for Proto members.
Name
Email
Subject
Comment *
File
Select/drop/paste files here
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Expand all images

[–]

 No.804470>>804534 >>804556 >>804737 [Watch Thread][Show All Posts]

>We’re used to attaching peripherals to our computers, when we have a need for them to interact with the world around them. An Arduino Uno needs a shield to turn on the lights, for example. Just sometimes though there is the potential for unintended interaction between a computer and the real physical world which surrounds it, and it’s one of those moments that [Alfredo Ortega] has uncovered in his talk at the EKO Party conference in Buenos Aires. He demonstrates how a traditional spinning-rust computer hard disk interacts with vibration in its surroundings, and can either become a rudimentary microphone, or be compromised by sound at its resonant frequency.

>It seems that you can measure the response time of the hard drive head during a read operation without requiring any privilege escalation. This timing varies with vibration, so can be used to reconstruct the sound that the drive is facing. Thus it becomes a microphone, albeit not a very good one with a profoundly bass-heavy response. He goes on to investigate the effect of sound on the drive, discovering that it has a resonant frequency at which the vibration causes it to be unreadable.

>Sadly the talk itself appears not yet to be online, but given that previous years’ EKO talks are on YouTube it is likely that when the dust has settled you will be able to see it in full. Meanwhile he’s posted a video demonstration which we’ve posted below the break.

https://hackaday.com/2017/10/08/your-hard-disk-as-an-accidental-microphone/

 No.804472>>804479 >>806714

It's a magnetic tape disc, and just like the fucking ceramics of 7000 years ago, which were made by rotation, they capture sound.

That's obvious.


 No.804479

>>804472

Everything captures sound, yet this experiment also demonstrates that the resonating sound causes the disc to be unreadable and eventually the OS disconnects it.


 No.804503>>804512

I want to see quality of the recordings.


 No.804512

>>804503

I would too. The waveform didn't look like it gave much information away. It's still pretty interesting.


 No.804521>>804526

Glow in the dark agencies have probably known about this for decades.


 No.804526>>804534 >>804736


 No.804534>>804736

File (hide): ed7d144b0743c63⋯.png (43.87 KB, 256x256, 1:1, aint_clicking_that.png) (h) (u)

>>804470 (OP)

>HDD-microphones.pdf

>>804526

(((You))) probably use this to identify hard drives which have had all identification removed from them. Simple solution is replace the platter head when you remove identification from a drive. Well maybe not that simple.


 No.804556>>804558 >>804559 >>804567

>>804470 (OP)

is ssd confirmed now for less cia niggers than hdd?


 No.804558>>804561 >>806713

File (hide): a05d14dacb2e8ef⋯.png (15.1 KB, 300x100, 3:1, ITS_FUCKING_BOTNET.png) (h) (u)

>>804556

Hell no. SSD's by default have the "S.M.A.R.T" backdoors. Along with the firmware backdoors if you have access to the pci-e space to flash it. Atleast with older HDD's you can avoid such things.


 No.804559

>>804556

Ramdisk is what you want.

- io speed faster than SSD

- data destruction more reliable than HDD


 No.804561>>804731

>>804558

S.M.A.R.T. is as old as SATA. What da fuk HDD do you use that doesn't have this?


 No.804562>>804567 >>804731

PDF slides mention something about using this in remote cloud environment, but data centers have so much noise, staff is forced to wear ear protection. Good luck recording anything useful there.


 No.804567

>>804556

SSD's come with proprietary firmware running on low power CPUs that handle all the trickery it takes to fool windows into using the disc. The filesystem you choose to run in software on your OS is imitated on the drive, but the firmware uses a different drive-dependent filesystem that can access over provisioned areas as well as the cache. FOSS SSDs are made by that one company in Worst Korea and are expensive, but modular. HDD can be less CIA, but it usually doesn't matter since storage isn't the biggest attack surface.

>>804562

lol

>measuring hard drive models by ear


 No.804731>>804733 >>804739

>>804561

>what is a IDE drive

>>804562

The noise doesn't matter. It's better to use this as a method of getting a certain oscilation of noise to identify the drive like a UUID. As a malware vector or spying vector it's implausable without much effort.

But this is easly gotten around by changing the drive physically after you purchase it like a single platter being replaced.


 No.804733>>804736

>>804731

judging by video https://www.youtube.com/watch?v=ntw32kYDryM , it's enough to block sound by hand to change response time, so it's not very useful for reliable identification. Still a data-point though, I guess.

I am not familiar with nitty-gritty details, how do syscalls work over the network?

Will secure NAS with massive raid and lots of caching placed in soundproof room save me?


 No.804736

>>804733

No I was thinking if someone got physical access you could sound test it for unique identification. Kinda like n-s-yayyy-kun admited here >>804526 . But something to track hard drives with identification removed as mentioned here >>804534

You're safe from network attack using your hardrive to listen to you for now?


 No.804737>>804738 >>807237

File (hide): c76dba4d9dd7d06⋯.jpg (65.77 KB, 600x900, 2:3, 1503406116896.jpg) (h) (u)


 No.804738

>>804737

But think of the tracking. What if someone deleted the data on the drive before you could backdoor/get to it and it was unidentifiable. You could sound test it for a UUID from the factory if n-s-yayyy-kun. I have no doubt (((they))) already do such things.


 No.804739>>804740 >>807243

>>804731

S.M.A.R.T. was even available on many IDE drives. Please tell me you're larping and not using some 800MB drive from the 90's.


 No.804740>>804741

File (hide): 23bafc511ab5fd3⋯.png (85.25 KB, 260x260, 1:1, whynotboth.png) (h) (u)

>>804739

You can't just use one btw. You need atleast four or so unless you want to airgap a compromised drive across everytime to access pictures and shit.


 No.804741>>804742

File (hide): b30a82b56178293⋯.png (83.12 KB, 590x652, 295:326, disgust.png) (h) (u)

>>804740

>access pictures

Anon...


 No.804742

File (hide): 84a0e8d2e9ccd40⋯.png (81.51 KB, 491x491, 1:1, n-s-yayyy-kun.png) (h) (u)

>>804741

(You) don't understand what that picture of why not both meant, did (you)?


 No.804751>>804786

at least it isn't as bad as electromagnetic leaks and TEMPEST vulnerabilites


 No.804786

>>804751

Tempest encompasses shit like this. It's not squarely aimed at unintentional RF transmissions.


 No.804793


 No.806617>>806619 >>806703

>not using a zip drive


 No.806619

>>806617

>not using a faraday cage enclosed and waxed DRAM as a drive


 No.806703>>807314

>>806617

>using magnetic storage


 No.806713

>>804558

>"S.M.A.R.T" backdoors

ayy lmao


 No.806714>>807669

>>804472

Wasnt this proven to be a load of shit


 No.807237

>>804737

>tfw I can read the labels on this pic

what did the chans do to me


 No.807243

>>804739

I remember using one back in the 90's, and it had SMART.


 No.807314

>>806703

All storage is magnetic you egg


 No.807669

>>806714

It sounds like bullshit to me but I have no proof and I've seen these 1337 researchers do some really crazy wizardry




[Return][Go to top][Catalog][Screencap][Nerve Center][Cancer][Update] ( Scroll to new posts) ( Auto) 5
34 replies | 6 images | Page ?
[Post a Reply]
[ / / / / / / / / / / / / / ] [ dir / cyber / eah / f / fapioh / just / pdfs / senran / sfw ][ watchlist ]