Search results

  1. K

    Cheap WiFi relay device needed

    What is the absolute cheapest way to get a Raspberry Pi-style board, which has WiFi, and the ability to provide constant power using solar or other renewable means? Or even just a really long-lasting battery rather than even renewable energy? I am looking for links to products that I can buy...
  2. K

    Has anyone ever shown a phone baseband attack..?

    Has anyone ever shown a phone baseband attack..? Using a fake cell tower, you would send data which takes over the baseband.. and then we know the baseband can control the main phone system. Does anyone actually have any proof of this in the wild...? Other than spies or Feds, I've never seen...
  3. K

    Modify Ethernet/WiFi so only certain marked data packets can be uploaded..?

    I am using Linux. Is it possible to modify Ethernet/WiFi so only certain data packets can be uploaded...? Let's say that a computer gets hacked via web browser, but the WiFi/Ethernet only allows certain data packets to be uploaded. You can't predict what data might get downloaded to your...
  4. K

    A list of computers that do not "hold state"..?

    Does anyone have a list of computers with no writable firmware..? If you get hacked, hackers can deeply infect the BIOS, GPU, WiFi and other components that "hold state". Then, even if you wipe your hard drive after getting infected, you can still just get re-infected again, due to the deep...
  5. K

    How to dissociate an already-hacked computer from your real identity..?

    Let's say that you have a computer that is hiding behind a dedicated Tor Ethernet hotspot. So let's assume the computer got hacked by web browser exploit. So it is hacked, but it is still connected via a Tor Ethernet. Therefore, the hacker can see WHAT you are doing, but not WHO you are, i.e...
  6. K

    Question on networking - who can see who?

    Alright. I came to the conclusion that this is all a waste of time. A hacker (especially nation state) would hack your main home router. Then hack your endpoint laptop. Then they can see that both are connected to a dedicated Tor router in the middle, through its MAC address or other...
  7. K

    Question on networking - who can see who?

    I am planning something even better than Tails. I'm going to have a dedicated Tor router that runs inside Qubes. There is then a 2nd laptop that connected into the Qubes Tor router, to share the Tor connection. Thus, even if the laptop browser gets hacked, they can only see what I'm doing...
  8. K

    Question on networking - who can see who?

    My question is shown as an image: Main router => Tor computer will be a WiFi connection Tor computer => My laptop will be a wired Ethernet connection. Laptop has no WiFi chip at all. This is really a question about simply networking itself. Ignore the Tor concept altogether. I'm simply...
  9. K

    Some questions about Tails

    Hi, I would like to ask some security-focused questions on Tails, the Linux privacy OS. 1. We know that Javascript and plugins are removed from the Firefox Tor browser, because these are 2 of the most common ways to hack a browser. But, is there any way to hack Firefox that doesn't depend on...
  10. K

    5 important security questions...

    OP here. OK.... Some interesting responses. The thing that I really want to know, above all, is whether you could use a 2nd recording app, to prevent a mic from being listened to in the background. I have personally used systems like removing a mic, or smashing a mic with needles, and using...
  11. K

    5 important security questions...

    I have some important security questions that I would like answered. 1. If you were to strip down a web browser to remove all plugins and Javacsript... are there any browser exploits that would work...? Can it still be hacked..? 2. How would you go about downloading something like Tor or...
  12. K

    Best way to filter out IP addresses with hardware..?

    Hi, it's the original poster here. So, how would you access this router...? Would it have a touch screen or something on it, or would I have to access it through another computer..? Because remember, the original issue is that if the Windows computer itself is hacked, then obviously that...
  13. K

    Best way to filter out IP addresses with hardware..?

    I am looking to filter out IP addresses using hardware external to the computer itself. I have decided that using Windows' system for filtering IPs/hosts is no good, because if someone hacked the computer itself, then they could just alter all of that anyway. So it needs to be some...
  14. K

    Need to obtain BIOS software

    OK, johnb35... thank you for that link. Yeah.... they don't even have a download for the BIOS... How very disappointing... I know I'm definitely not buying an Advent again... So... I'm basically stuck with this (possibly) infected BIOS.. unless I can find someone else who has an Advent Roma...
  15. K

    Need to obtain BIOS software

    The reason I think I have a virus in my BIOS, is because I don't even use an operating system installed on a hard drive. I boot directly from a Ubuntu live disc, and despite that, people keep hacking into my computer, seemingly from the instant I turn it on. This leads me to assume that it's...
  16. K

    Need to obtain BIOS software

    Hi, my BIOS information is as follows: BIOS Information Vendor: Phoenix Version: 1.05AD Release Date: 09/16/2009 --- I think that I have a virus in my BIOS... and I need to flash my BIOS in order to get the original version of the BIOS...
Top