[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/sci/ - Science & Math


View post   

File: 123 KB, 852x1024, 1550436958083.jpg [View same] [iqdb] [saucenao] [google]
10467882 No.10467882 [Reply] [Original]

This perhaps is grounds for /g/, although how do telecommunications AV (cellphones) remain in use ( by glow-in-the-darks) once a battery is depleted?

>> No.10467886

>>10467882
capasitors

>> No.10468049

>>10467882
There are these things called wires

>> No.10468089

Are you asking how CIA niggers can spy on your cell phone while it's powered off? They fucking can't.

>> No.10468100

>>10468089
what about airplane (true) mode?

>> No.10468111

>Airplane mode, Aeroplane mode, Flight mode, Offline mode, or Standalone mode is a setting available on smartphones and other portable computers that, when activated, suspends radio-frequency signal transmission by the device, thereby disabling Bluetooth, telephony, and Wi-Fi. GPS may or may not be disabled, because it does not involve transmitting radio waves.

>> No.10468512

>>10468089
Have you ever heard of tempest? How about the soviet thing? Why U say no when your eyes say yes?

>> No.10468526

>>10468512
>Have you ever heard of tempest?
Yes.

>How about the soviet thing?
Not sure what you're referencing.

>Why U say no when your eyes say yes?
Weird question.

Explain to me how TEMPEST technology could be used to read data off my cell phone while it's powered off. I'll wait.

>> No.10468553

>>10467882
Put your phone in a Faraday Cage if you're that schizophrenic. This is used for pentesting computer viruses and on sensitive government computers. It means they can't exfiltrate any data through radio signals. There are other ways though like fan vibrations but let's be honest, the FBI doesn't care about some fucking racist retard like you.

>> No.10468555

>>10468526
Because the CIA could have infiltrated one of the manufacturers of a part in the cellphone and implanted a hidden battery and low-power computer which sifts signals off the main cellphone then retransmits them when a beacon is detected within distance

Not that they're doing this shit to you, but with a bit of engineering knowledge and some smarts systems like this aren't even hard to make, just typically useless, impractical, and illegal or bad for public relations of a company, so they don't do it.

>> No.10468561

>>10468555
That's not really a TEMPEST thing, but yeah it's possible although insanely unlikely for many reasons and frankly a stupid plan.

>some smarts systems like this aren't even hard to make
the difficult part is inserting it into the manufacturing process, not making it to begin with.

>> No.10468573

>>10468561
Or inserting it into the transport process or customs inspections

>> No.10468588

>>10468573
That type of shit needs to be done during design and manufacturing, not during transport (especially if it's on a massive scale). Customs would have no idea how to find it

>> No.10468597

>>10468588
It's called CIA operatives working inside customs

It's not unrealistic and if they wanted it to happen it would happen, it's not even hard. Reverse engineer the data buses and siphon them

>> No.10468603

>>10468597
Yeah they could do it on a small basis in the transport/post-manufacturing phase, but not on a massive scale and it wouldn't make sense to do in customs when you are focusing on a small number of targets.

>Reverse engineer the data buses and siphon them
Tell me what you think that means.

>> No.10468609

>>10468603
For instance the wires that transport data between external storage like SD cards perform this transfer via low level data transfer protocols on N wires which can be reverse engineered, then you can read the signals and interpret the filesystem events taking place which means you can try to scan for certain signals, like file write events whose buffers contain an xml open tag containing a key value you want to extract from some database you know exists on the machine.

Dumb example but same for network interfaces. Not saying it's easy but it is not impossible

>> No.10468613

>>10468609
It's not impossible but as the other anon said it's an impractical and pretty dumb plan in general. You seem to be focusing on what is technologically possible without considering what actually makes sense depending on your goal.

Anyway to my original point you ain't reading shit off a phone that's powered off. When you power off your mass-produced phone, there is no reason to think that it is not indeed powered off. The exception would be if the CIA niggers actually wanted to target you specifically and inserted something (HW or SW) into your phone to monitor you.

>> No.10468619

>>10468613
You misunderstood, nothing is read from the phone while it's powered off, it's read while the phone is powered on and in use, then exfiltrated while the phone is powered off through backup batteries embedded in the phone's spy chip and low power transmitters

>> No.10468624

>>10468619
Ok fine. But that is totally impractical on a massive scale and there is no reason to think that is happening (with the one possible exception of Huawei). Unless OP has done something to upset the CIA niggers there is no reason to think they inserted something into his phone. And even then, they would probably just do a software or network attack or bug his car and apartment

>> No.10468625

>>10468624
Oh and of course in the case of Huawei it isn't CIA niggers it's Chinese niggers