Road Bike, Cycling Forums banner
1 - 20 of 23 Posts

·
Registered
Joined
·
5,380 Posts
Discussion Starter · #1 ·
"Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

So, when my TV gets hacked, what does that mean?
They are watch the same porn as me?
 

·
Quiet, daddy's drinking
Joined
·
5,887 Posts
"Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

So, when my TV gets hacked, what does that mean?
They are watch the same porn as me?
Some Samsung tv's have voice command. A hack can turn this into a microphone so that anyone outside can listen into what is happening in the room. This of course would not apply to your average idjit but could be useful in select governmental meeting rooms, hotel rooms, etc.
 

·
Registered
Escorted from the White House
Joined
·
36,940 Posts
Some Samsung tv's have voice command. A hack can turn this into a microphone so that anyone outside can listen into what is happening in the room. This of course would not apply to your average idjit but could be useful in select governmental meeting rooms, hotel rooms, etc.
And of course, they can do the same thing to your smartphone too.
 

·
( ͡° ͜ʖ ͡°)
Joined
·
8,152 Posts
In related news:
How IoT hackers turned a university's network against itself | ZDNet

Every appliance you have that's connected to the internet can generate traffic...That's your "smart" TV, furnace, door locks, thermostat, toothbrush, etc. If all of your devices suddenly activate on your personal network, that amount of traffic can cripple whatever it is you're trying to do (Post on RBR, watch Netflix, whatever.)
 

·
gazing from the shadows
Joined
·
27,287 Posts
Some Samsung tv's have voice command. A hack can turn this into a microphone so that anyone outside can listen into what is happening in the room. This of course would not apply to your average idjit but could be useful in select governmental meeting rooms, hotel rooms, etc.

That is a specific example.

In general, once you have the TV you are inside of the (home or business) network, and all sorts of things are easier to do then.
 

·
Registered
Joined
·
6,189 Posts
"Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

So, when my TV gets hacked, what does that mean?
They are watch the same porn as me?
I read through some of the articles, and I guess they were able to create a "Fake-off" command, so your TV looked like it was off, but the voice command mic was still on and they were able to listen in.


Now there's a crowd I don't want to pick a fight with.

Geessshhhh
 

·
Opus was just napping
Joined
·
21,656 Posts

·
Banned
Joined
·
23 Posts
In related news:
How IoT hackers turned a university's network against itself | ZDNet

Every appliance you have that's connected to the internet can generate traffic...That's your "smart" TV, furnace, door locks, thermostat, toothbrush, etc. If all of your devices suddenly activate on your personal network, that amount of traffic can cripple whatever it is you're trying to do (Post on RBR, watch Netflix, whatever.)
All the more reasons to not have all that crap in your house. I don't see a need for a T-Stat to be on the internet.
 

·
Registered
Joined
·
5,062 Posts
And of course, they can do the same thing to your smartphone too.
I took a pen and jabbed it into my mic on my phone.

I then painted over both camera lenses.

The speaker sucked anyway

So, I speak no evil, see no evil, or hear no evil
 

·
Registered
Joined
·
2,767 Posts
"Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

So, when my TV gets hacked, what does that mean?
They are watch the same porn as me?
You watch porn on your television???

Does not compute.
 

·
Registered
Joined
·
2,767 Posts
This is RBR. He's got quite the VHS collection :lol:

Ahhh of course... spoken like someone who has seven years of RBR membership over me. Evidently you've seen things!
 

·
Registered
Joined
·
2,580 Posts
It's my understanding that the TV hack required a physical USB dongle plugged into the back of the TV, and a custom firwmware be loaded. It would simulate the TV being powered off by disabling the LED's and any other indications it was on, but it would still be recording audio. The audio could not be transmitted. I could only be saved locally on the USB dongle and retrieved manually later.

Bottom line, don't let strangers come into your house and plus USB dongles into the back of your TV and you should be fine.
 

·
gazing from the shadows
Joined
·
27,287 Posts
It's my understanding that the TV hack required a physical USB dongle plugged into the back of the TV, and a custom firwmware be loaded. It would simulate the TV being powered off by disabling the LED's and any other indications it was on, but it would still be recording audio. The audio could not be transmitted. I could only be saved locally on the USB dongle and retrieved manually later.

Bottom line, don't let strangers come into your house and plus USB dongles into the back of your TV and you should be fine.
Your understanding of what a single version of some code does might be correct, but it doesn't mean what you think it means. You clearly don't think like a hacker, or a spy.

The dongle application would make sense for places like hotel rooms for a spy. Compromise the cleaning staff (or just get a master swipe card), and own any room at any time without exposure of higher level assets, and without providing IPs to backtrack if the dongle is discovered. That's the reason for recording to the dongle, to keep the trail cold if the hack is discovered. And most people won't discover it. Load some sexy videos on it, and people will just think it was left behind. The hack goes in a hidden partition, or at least a hidden folder. So even if found, it won't trigger worries except among the highly paranoid. Who would look for a trail, but not be able to find one.

Any hackers know that one version of an exploit can be altered quickly, and combined with other exploits to get the job done. There have been many stories of smart TVs being hacked remotely by using the default passwords from the factory. Any exploit that can record to a dongle can be changed to send that information elsewhere, such a change is trivial. I am sure you get the point.
 

·
Banned forever.....or not
Joined
·
24,426 Posts
I have some magic beans if you are interested.
 

·
Registered
Joined
·
6,017 Posts
"Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

So, when my TV gets hacked, what does that mean?
They are watch the same porn as me?
This is scary stuff, but I fear this less that all the information being collected on us by Google, Amazon, etc. Unless you are ready to go off the grid and hole up in a bunker in Idaho, there is not much you can do
 
1 - 20 of 23 Posts
Top