Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

NSA router implants

Name: Anonymous 2014-05-15 15:04

Name: Anonymous 2014-05-15 15:58

For every router ever, provided you are a target. As long as you buy equipment physically at a store, you are safe from that specific threat.

Name: Anonymous 2014-05-15 16:02

[opk

Name: Anonymous 2014-05-16 14:30

>>2
What if the shop had the router shipped?

Name: Anonymous 2014-05-18 6:06

You can always take the thing apart with a screw driver and look on the inside. If it's software based, reflash the firmware after you buy it. Best case scenario the firmware is open source and you build it from a trusted machine. If it's closed source, verify signatures with the manufacturer. Then reverse engineer the firmware until every behavior is uncovered. If there is hidden hardware at work, then monitor it as a black box. Sniff all traffic coming in and going out of the router and analyze the traffic from a trusted machine. Run a virtualized router with the firmware and simulate its intended behavior. If there is a difference, hi-light it and investigate the real traffic yourself. Create your own server that pretends to be the home that was phoned. Study it like a rat in a lab.

Name: Anonymous 2014-05-18 14:51

>>5
reflections on trusting trust

Name: Anonymous 2014-05-18 22:37

>>6
Build your first trusted machine out of homemade transistors.

Name: Anonymous 2014-05-19 6:05

>>7
I doubt it would have enough memory to build gcc or even clang.

Name: Anonymous 2014-05-20 2:57

>>8
I don't need inferior compilers. If I don't have a computer with enough memory then I will simply use my own mind.

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List