On Sun, 29 Jul 2018 at 05:08:30 +0200 Arnt Karlsen <a...@iaksess.no> wrote:
> On Sun, 29 Jul 2018 02:28:52 +0200, Alessandro wrote in message > <20180729022852.5208a5ca@ayu.localdomain>: > >> On Sat, 28 Jul 2018 at 15:28:56 +0200 >> Arnt Karlsen <a...@iaksess.no> wrote: >> >>> On Sat, 28 Jul 2018 10:07:53 +0200, Alessandro wrote in message >>> <20180728100753.4ff8dd7c@ayu.localdomain>: >>> >>>> On Fri, 27 Jul 2018 at 14:17:14 -0500 >>>> Eric Lee Elliott <li...@ericelliott.us> wrote: >>>> >>>> [...] >>>> >>>>> like >>>>> memory sticks are know to have internal computers. How do Devuan >>>>> users know the SSD is not calling home >>>> >>>> How could they possibly do it? >>> >>> ..using any available networking hw in a non-standard way that flies >>> under our radars. >> >> How could it access a different piece of hardware on the system >> bypassing the kernel? > > ..e.g. using part of a binary "lose weight ad" crafted to do this. Which means you'd need *this* binary to do the actual "dirty work". So, what would you need the SSD-embedded binary to do that your "lose weight ad" binary could not do? >>>> Do you think they have a WiFi embedded? >>> >>> ..always possible, in some non-standard form to fly under our >>> radars. >> >> All I can think of is having the device emit a given noise (EM or >> mechanical) that a device could pick up and decode. But you'd need an >> external device. > > ..or "make do with whatever you have onboard" in new "creative" ways. That is? > ..people has played music on printers and harddisks produced to print > oud documents and store data, by hacking them in new creative ways, > for decades. Yes, I know. Why do you think that poses a security threat? Alessandro _______________________________________________ Dng mailing list Dng@lists.dyne.org https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng