On Sun, 29 Jul 2018 at 05:08:30 +0200
Arnt Karlsen <a...@iaksess.no> wrote:

> On Sun, 29 Jul 2018 02:28:52 +0200, Alessandro wrote in message 
> <20180729022852.5208a5ca@ayu.localdomain>:
>
>> On Sat, 28 Jul 2018 at 15:28:56 +0200
>> Arnt Karlsen <a...@iaksess.no> wrote:
>>   
>>> On Sat, 28 Jul 2018 10:07:53 +0200, Alessandro wrote in message 
>>> <20180728100753.4ff8dd7c@ayu.localdomain>:
>>>    
>>>> On Fri, 27 Jul 2018 at 14:17:14 -0500
>>>> Eric Lee Elliott <li...@ericelliott.us> wrote:
>>>> 
>>>> [...]
>>>>       
>>>>> like 
>>>>> memory sticks are know to have internal computers.  How do Devuan
>>>>> users know the SSD is not calling home        
>>>> 
>>>> How could they possibly do it?       
>>>
>>> ..using any available networking hw in a non-standard way that flies
>>> under our radars.    
>> 
>>   How could it access a different piece of hardware on the system
>> bypassing the kernel?  
>
> ..e.g. using part of a binary "lose weight ad" crafted to do this.

  Which means you'd need *this* binary to do the actual "dirty work".
So, what would you need the SSD-embedded binary to do that your "lose weight
ad" binary could not do?

>>>> Do you think they have a WiFi embedded?      
>>>
>>> ..always possible, in some non-standard form to fly under our
>>> radars.    
>> 
>>   All I can think of is having the device emit a given noise (EM or
>> mechanical) that a device could pick up and decode.  But you'd need an
>> external device.  
>
> ..or "make do with whatever you have onboard" in new "creative" ways.

  That is?

> ..people has played music on printers and harddisks produced to print
> oud documents and store data, by hacking them in new creative ways, 
> for decades.

  Yes, I know.  Why do you think that poses a security threat?


Alessandro
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to