Check this out. Wifi routers turned into electromagnetic cameras that can see people. https://www.youtube.com/watch?v=qkHdF8tuKeU
Check this out. Wifi routers turned into electromagnetic cameras that can see people. https://www.youtube.com/watch?v=qkHdF8tuKeU
I simply use the older plasma TVs, you can still find them at some retail stores that specialize in used household furniture and utilities for sale. As long as they have the AV, USB and HDMI connections they are good for most devices. Although one downside is anything encoded with modern x265/h265 formats will not work. Plasma TVs only recognize the standard x264/h264 video formats. Typically that will not matter because most videos shared online still tend to be standard x264/h264 formats you just need to check and make sure.
For sure, the microphone and wifi in my snitchTV definitely got to go! The laptop kinda need wifi to be functional
In order to make this easy, I would recommend purchasing the IFixit Pro Tech Toolkit. It comes with everything you need to work on PCs, laptops, (modern) TV sets, tablets, smartphones and all kinds of other types of consumer electronics. It will help you be able to remove the WiFi card without risking damaging anything opening it up to get to it. If you are super paranoid you can remove cameras and microphones too ;)
That's good and all, just make sure to physically remove the WiFi card from the laptop or PC you are using. The WiFi card will have two small terminals with wires hooked to them, and connected to the motherboard. Simply unscrew it, pull it out and disconnect the two wires and you can remove it.
Hold on, me off to the shop getting ethernet cables and ditching the wifi!
Wikileaks exposed a handful of these Wifi surveillance techniques, and you can always refer to the leaked NSA ANT catalogs which exposed ways the federal government and intel agencies can monitor the airwaves. Basically consider anything with Wifi similar to radio, anyone can easily eavesdrop on those communication or hack into those devices. Whereas with hard wired connections, you need to physically tap them, which takes more skill, time and resources to do so. Wifi makes computers and devices more vulnerable to interception because it creates the beacon to do it remotely at any time and much more swiftly and covertly.
Very interesting, I didn't know this. Do you have more info on how this can be done. Like assume a PC connected to a normal wifi gateway. Here the wifi is enough to compromise your privacy?
NSA/others have backdoored proprietary since at least Windows 95, but I get it. What users should have been concerned about, long ago, was the adoption of IEEE standard 802.11 and how WiFi be used to jump air gaps, ping nearby nodes, side channel attacks, on and on.... the ubiquitous spy state in everyone's hands today.
I would add this. Don't use microsoft windows or apple os. They actively spy on their users, and are rapidly converging to similar spy intensity as smartphones.
https://www.privacytools.io/
I agree, mobile phones are literally a deal with the devil with respect to privacy
The best idea for becoming a 'ghost' is learning good opsec and forward secrecy. If you were to post on social media, make sure you can fake an identity and not have it actually associated to you personally, and keep that computer or laptop seperate from your work/personal legit computer/laptop. Never use those modern smartphones for social media, they are 100% trackable spy devices and no amount of trickery will ever change that. Privacy died with the invention of the smartphones honestly. Around the time of HTML5 and modern protocols being adopted such as WebGL and WebRTC, no coincidence.
Yeah it's a good approach. I see mainly two endeavours in internet privacy. i) Become a ghost - best possible privacy without regards to breaking site features. ii) Optimal privacy under the constraint that you still want to be able to use standard site features I will be making two such subtopics. If you see a post in here that are great with respect to one of the endeavours, please link this post into the repective subtopic.
>>post2629 Sounds like a good way to go about it, you can never be too paranoid these times. Especially now, where people around the world are being arrested for vanilla social media posts.
It will. However, if you want real user privacy and not risk being easily hacked or doxxed, wishing to maintain good OPSEC it must be turned off. If you need to visit a site that requires it, perhaps install a seperate isolated web browser just to use those kinds of sites, and only use those sites on that dedicated web browser. That way you are not risking all your browser profile caches/history being exposed to YOU specifically. I would even go further. I have more than one computer, a legit personal work one and then another for social media/shitposting. These computers are kept completely seperate while I'm online, and if I'm using one I disconnect the other, and vice versa. Compartementalizing and isolating data also is key to security and privacy.
I like your thinking, but turning off WebRTC will break almost all web based voice services. Discord for one, uses webRTC to make voice possible.
Really cool ideas guys.
I would like to add something. There is most definitely a fácade today when it comes to web browser privacy and security. Here are the four biggest culprits privacy buffs need to know about: #1: WebRTC can be used to identify users who hide behind Tor, VPNs or other web proxies, easily exposing their real IP address. #2: WebGL can leak sensitive data from your CPU and RAM when online, thus exposing what you are using, typing, creating or doing on your personal computer OUTSIDE of normal web browser activity. #3: GeoAPI can be used to triangulate your IP address and track browser activities in broader scope, associating ''you the user'' (your current IP) with all visited third party sites/nodes. #4: Telemetry can be used by all kinds of third parties to keep track of your browser and what you have been doing and continue to do while browsing the web. It automatically transfers all your browser profile & session data to third parties without consulting users. Having ANY of these major vulnerabilities enabled seriously compromises user security to the point of non-existence, thus rendering "privacy" a fácade. I would highly recommend testing your online opsec using online Browser Leaks tests (you may be stunned to you find you have absolutely no privacy at all): http://www.browserleaks.com/