I always use HTTPS everywhere and Private Browsing mode. Soon I’m going to reformat my online machine b/c the registry got corrupted by a bad Tor de-install – then I’ll go back to mostly Tor, no more regular Firefox. Occasionally I turn them on for a few minutes to DL something, before manually deleting them. So now I have to start using CD’s for my sneakernet xfers, which is all xfers between my online machine and my work machine. Tags: computer security, hacking, malware, NSA, USB These are exactly the sorts of attacks the NSA favors.ĮDITED TO ADD (8/14): Good writeup. And likewise, any USB device could silently infect a user’s computer. Any time a USB stick is plugged into a computer, its firmware could be reprogrammed by malware on that PC, with no easy way for the USB device’s owner to detect it. The element of Nohl and Lell’s research that elevates it above the average theoretical threat is the notion that the infection can travel both from computer to USB and vice versa. WUALA STORAGE HACK CODEThere’s not even any trusted USB firmware to compare the code against. The devices don’t have a restriction known as “code-signing,” a countermeasure that would make sure any new code added to the device has the unforgeable cryptographic signature of its manufacturer. But old-fashioned USB hygiene can’t stop this newer flavor of infection: Even if users are aware of the potential for attacks, ensuring that their USB’s firmware hasn’t been tampered with is nearly impossible. Most of us learned long ago not to run executable files from sketchy USB sticks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |