Skip to comments.
This Little USB Necklace Hacks Your Computer In No Time Flat
TechCrunch via Hacker News ^
| Dec 18, 2014
| Sami Kamkar
Posted on 05/14/2015 5:42:34 PM PDT by 9thLife
click here to read article
Navigation: use the links below to view more comments.
first 1-20, 21-29 next last
1
posted on
05/14/2015 5:42:34 PM PDT
by
9thLife
To: 9thLife
And where can I get one of these?
2
posted on
05/14/2015 5:45:40 PM PDT
by
dware
(In 2016, the GOP has 2 choices: CRUZ OR LOSE!)
To: dware
3
posted on
05/14/2015 5:48:10 PM PDT
by
Raycpa
To: 9thLife
My USB ports are protected by one of these.
4
posted on
05/14/2015 5:48:47 PM PDT
by
chris37
(Heartless)
5
posted on
05/14/2015 5:51:46 PM PDT
by
Kipp
To: dware
I think he sho.ws you how to build it.
6
posted on
05/14/2015 5:55:28 PM PDT
by
9thLife
("Life is a military endeavor..." -- Francis)
To: 9thLife
wow, that is scary. so simple, yet so effective
7
posted on
05/14/2015 6:35:09 PM PDT
by
Scutter
To: 9thLife
Maybe I'm just paranoid, but I assumed every chinese made USB thumbdrive already did stuff like this.....
So when the day comes that they want to shut down all computers......They just send the command. ;-)
8
posted on
05/14/2015 6:41:35 PM PDT
by
HP8753
(Live Free!!!! .............or don't.)
To: HP8753
The line between paranoia and sound reasoning is getting mighty thin lately.
9
posted on
05/14/2015 6:44:17 PM PDT
by
9thLife
("Life is a military endeavor..." -- Francis)
To: 9thLife; ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; ...
This is a graphic video demonstration of what can be accomplished with the USB vulnerability that ALL computers have. . . it is, however, being demonstrated on a Macbook Pro. With a $20 USB custom dongle device, which has been pre-programed, it is possible to install malware on the Mac that seizes control of your firewall, DNS redirects, and essentially owns your Mac. It DOES however, require physical access to your computer and time (about 1 minute) to do its nefarious activity. It essentially gets around many of the built-in protections Apple has put in to require a human operator by skillful handling of the mouse by positional movement of windows and mouse repositioning by script to do what normally must be done by a human hand.
Do not leave your computer unattended without a password! PING!
Apple and ALL Computer USB Security Ping!
If you want on or off the Mac Ping List, Freepmail me.
I challenge the members of the Apple ping list to each donate at least $10 each to the latest Freepathon. I HAVE donated $100. Many members of the Apple Ping list are already rising to the challenge. Join them. Let's show the power of the Apple Ping list in supporting Freerepublic!
If you have ordered an Apple Watch,
MAKE A DONATION TO THE FREEPATHON!
10
posted on
05/14/2015 7:14:43 PM PDT
by
Swordmaker
( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
To: All
We’ve had a thread on this threat before. . . but this one has a great video on how it is done. . . worth watching.
11
posted on
05/14/2015 7:16:06 PM PDT
by
Swordmaker
( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
To: chris37
But yours has ammo in the magazine right.....:o)
12
posted on
05/14/2015 7:25:35 PM PDT
by
Squantos
( Be polite, be professional, but have a plan to kill everyone you meet ...)
To: Squantos
It do, it do, but the magazine isn’t in the well, and the cap is on the magazine.
But my German Shepherd will fend off any suspect USB devices long enough for me to get my weapon system online!
13
posted on
05/14/2015 7:32:08 PM PDT
by
chris37
(Heartless)
To: 9thLife; Swordmaker
Creepy. But this USB device must be physically inserted into a machine to compromise it, right?If so, pay attention to who is allowed access to your machine!
Jesus Christ: You cant impeach Him and He aint gonna resign.
14
posted on
05/14/2015 8:01:25 PM PDT
by
rdb3
(THY KINGDOM COME!)
To: 9thLife
Good video.
How might a computer determine that a USBdriveby is not just a new keyboard or mouse? Some sort of hardware authentication?
15
posted on
05/14/2015 8:12:34 PM PDT
by
TChad
(The Obamacare motto: Dulce et decorum est pro patria mori.)
To: rdb3
Creepy. But this USB device must be physically inserted into a machine to compromise it, right? Posilutely, absotively correctomundo. . . and it will work just as well on a Windows or Linux box with a USB port because the vulnerability is in the USB standard. It's why Apple went with the new USB-C ports. Those don't have that vulnerability.
16
posted on
05/14/2015 8:19:21 PM PDT
by
Swordmaker
( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
To: TChad
How might a computer determine that a USBdriveby is not just a new keyboard or mouse? Some sort of hardware authentication? from my understanding, it cannot. They'd have to change the USB standard completely. . . or put USB into a sandbox on the system. That is probably the only viable solution.
17
posted on
05/14/2015 8:21:30 PM PDT
by
Swordmaker
( This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
To: TChad
Each USB device has a unique hardware ID. It is a sequence of two 32-bit hex numbers: something like 0FEF:A7E8.
(Tip: it looks like a 32-bit segmented memory address! Run for the hills!)
The first word is the manufacturer ID. They are unique, up to 2^32 manufacturers can be listed (~4.2 billion).
The second word is a unique number assigned to the specific device. As such, each manufacturer can have up to 2^32 different devices.
Note that this is listed BEFORE the device even tells the computer what USB device class it is (HID, in this case—human interface devices, which encompass keyboards and mice)—one could theoretically block devices coming from a particular manufacturer.
(Tip: The manufacturer ID used in the example actually refers to a real business concern; they don’t really have any devices to speak of...)
18
posted on
05/14/2015 10:28:00 PM PDT
by
__rvx86
(Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
To: __rvx86
Whoops; that was supposed to say "two
16-bit hex numbers."
Which means that there are up to 65536 manufacturers, with 65536 devices each.
19
posted on
05/14/2015 10:31:22 PM PDT
by
__rvx86
(Ted Cruz: Proving that conservative populism is a winning strategy. GO CRUZ!)
To: rdb3
Jesus Christ: You cant impeach Him and He aint gonna resign.I could see his POTUSness usurping this motto.
20
posted on
05/15/2015 12:29:17 AM PDT
by
9thLife
("Life is a military endeavor..." -- Francis)
Navigation: use the links below to view more comments.
first 1-20, 21-29 next last
Disclaimer:
Opinions posted on Free Republic are those of the individual
posters and do not necessarily represent the opinion of Free Republic or its
management. All materials posted herein are protected by copyright law and the
exemption for fair use of copyrighted works.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson