|
|
|
| Very cool! This seems almost like physical cryptography. Maybe there is a better term for it, but I’d be very interested in other work along these lines. |
|
| I guess this would be easy to spot for the end user. Maybe the app that is used for checking the pills can alert the user if one pattern is scanned multiple times. |
|
| Cameras continue to shrink in size and price. TEMPEST / Van Eck phreaking can be used to detect and locate hidden cameras, https://www.usenix.org/system/files/sec24fall-prepub-357-zha...
> For all spy cameras.. raw image.. encoding and compression.. takes place in an inbuilt read-write memory whose operations cause electromagnetic radiation (EMR).. Whenever the visual scene changes, bursts of video data processing.. aggravate the memory workload, bringing responsive EMR patterns. ESauron can detect spy cameras by intentionally stimulating scene changes and then sensing the surge of EMRs.. Experiments with 50 camera products show that ESauron can detect all spy cameras with an accuracy of 100% after only 4 stimuli, the detection range can exceed 20 meters even in the presence of blockages, and all spy cameras can be accurately located. |
|
| > smartphones.. integrate Faraday cages internally to mitigate.. EMR
Conductive inks can shield specific components, https://www.idtechex.com/en/research-report/conductive-ink-m... |
|
| PDF viewed on iOS 17.6 Safari in Lockdown mode, without error.
That's a pre-pub PDF hosted by the Usenix Security 24 conference, which takes place in two weeks. If a respected 30-year old security conference is posting hostile PDFs, that would be newsworthy. > VirusTotal behavior analysis What did it say exactly? Just tried a VT scan and it reported a score of 0 out of 95 (green), with zero detailed findings. That was the only/first/last submission of the URL, https://www.virustotal.com/gui/url/f7259d6da00636ec8632741d3... > That user has been posting a lot of links to pdf’s every day hosted on wordpress platforms and more Examples, please? I posted the Usenix Security paper. A quick scan of my submissions shows no PDFs in the last two weeks, and one other PDF in the last day, hosted on HP.com. |
|
| I’m unfortunately not able to view on desktop since I’m traveling but I’ll have to take a look upon my return tomorrow. Seems fishy the fact it was flagged with lockdown is suspicious. |
|
| On the other hand, knowing how the detection works you could shield the camera and suspend operations when significant luminance changes are detected. Cat and mouse, as usual :) |
|
| When the Americans secretly captured and dissembled a Soviet satellite, one of the night’s many challenges was replacing a plastic seal covering some part.
https://www.technologyreview.com/2021/01/28/1016867/lunik-ci... |
|
| What a good read!
I’d like to think that the counterfeit was the result of an early prototype of 3D printing. But in reality, it was probably the work of a mole or the office of disguise. |
|
| DoE (Sandia iirc) was the premier defensive seals lab in the US but shortly after 9/11 they removed most of their open documentation from the internet.
CIA has the main seals defeat capability in USG. |
|
| My first exposure to “tamper evident” mechanisms was in an anime series called “Death Note”.
https://youtube.com/watch?v=zZBR9iQ7DRA3D The main character has a series of mechanisms (door latch height, paper in between door and wall, mechanical pencil lead in door hinge) One out of place tamper seal, can ignore. But all 3 broken? Someone was in the room. Personally used the paper trick when I was young and living with parents and siblings. Would easily know when somebody entered and trifled through my things. Also used that mechanical lead pencil trick with my “secret” drawer where I had created a false bottom lol. |
|
| I encountered the hair trick on Ren and Stimpy...Ren's first chest hair was taped across a door or lid to show if it had been opened. Not sure why, but that left an impression on me. |
|
| > The hair trick can be used both by good guys and by bad guys.
Duh. Are you implying the existense of opsec-techniques that are only usably by "good guys"...? |
|
| I've seen those stickers on hard drives. I always assumed that maybe the internal mechanisms were in a vacuum or super-clean and opening the case would allow air or dust into the moving parts. |
|
| The higher-end and larger drives today are filled with helium (or vacuum in some exotic cases), and opening the case at all completely destroys the drive's ability to operate. |
|
| I'm pretty sure the helium-filled hard drives are incredibly difficult to seal, and IIRC are welded shut. I don't see how you'd open it in the first place without a dremel anyway. |
|
| This reminds me an old James Bond movie, with Sean Connery, where he picks one of his hair, licks his sticky fingers to seal his hotel room door. It later tells him that someone entered his room. |
|
| > Just because your police forces are awful doesn't mean they all are.
And the corollary is "Just because your police force is good, doesn't mean they all are", surely? |
|
| https://builtin.com/hardware/dust-identity-supply-chain-secu...
> A dust of nanoscale diamonds, blended with one of several possible polymers, is applied to a part or component. Thousands of randomly distributed crystals create a distinct fingerprint, which can’t be reverse-engineered or cloned.. identification is informed not only by the position of each crystal, but also the orientation of each crystal in relation to all the others.. number of possible distinct fingerprints: more than 10^230.. the dust comes from engineered, nitrogen-vacancy diamonds, in which some carbon atoms are replaced with nitrogen ones.. "The random nature of how [nanocrystals] fall, roll and tumble creates a fingerprint that is unique in the universe.” |
|
| I wonder if the colourful lentils trick could be bypassed by a 3D printer that recreates the pattern. This seems in range for a state actor. Or maybe even a hobbyist with lots of time. |
|
| Presumably you can't 3d print a lentil though.
Could do something like a robotic arm style of device which carefully places each color though. |
|
| I think that's quite obvious. You say that as if there were alternatives.
Are there any other, more convenient techniques to defend against evil maid attacks? |
|
| I always wondered what prevents the "red team" from ordering the same tape from amazon and reapplying it in the end. I suppose you can sign it, but that has dubious security. Am I missing something? |
|
| "As anarchists, we must defend ourselves against police and intelligence agencies that conduct targeted digital surveillance for the purposes of incrimination and network mapping." (https://www.anarsec.guide/recommendations/)
I wonder who the anarchists are that are afraid of "incrimination and network mapping" and what it is they're doing them that makes them afraid of that |
A side note: I think there's an unmet need for algorithms that can convert photos of these random patterns into text (or something similar) that can be stored in a database and searched quickly for matching patterns. I've tried image similarity algorithms like the ones used by e.g. Google Reverse Image Search, but they seem poorly suited for this task. I ended up writing my own crude algorithm in the paper above that converts a pattern into a set of strings, and it works OK, but surely there are better ways to do this.