this post was submitted on 25 Oct 2023
20 points (88.5% liked)

Privacy

31991 readers
734 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

Hi, I have been having a look at utilising RF and trying to understand how every device around me emits RF.

I recently came across RTL-SDR and HackRF, alongside software like SDR++, TempestSDR, gqrx etc. I know that I can spy on my monitor and record keyboard keys being pressed using RF, but what are some other ways I should be looking at to exploit my digital vulnerabilities, and trying to solve such problems?

Thanks!


Edit: I'm well aware that nothing I'm doing is that interesting to security agencies across the globe. With that said, I'm interested in maintaining my privacy, and this happens to be an avenue I find interesting. Any suggestions on how I can look to do so would be greatly appreciated!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 2 points 1 year ago (1 children)

Thank you for the comment. I did start watching DefCon presentations (and would like to visit in person someday!), and have been interested in RF hacking/ hardware hacking for a while now - just didn't explore it well enough.

Now that you mention it, I do want to pick up Bluetooth and other signals that devices give out. The eventual aim is to be skilled enough to run a personal honeypot and experiment with different protocols.

Thanks, I'll begin going over some coursework too. Your help is much appreciated!

[–] [email protected] 2 points 1 year ago (1 children)

Honeypots have gotten really weird lately. Anti-honeypot (along with anti-VM and anti-debugging) techniques and methods are more common than ever. I think something like 80% of all APT-level malware from the past 5 years use these techniques

[–] [email protected] 2 points 1 year ago* (last edited 1 year ago)

I see. That might not be such a good idea then. Thanks for pointing that out