this post was submitted on 05 Oct 2025
93 points (98.9% liked)

Hardware

4088 readers
99 users here now

All things related to technology hardware, with a focus on computing hardware.


Rules (Click to Expand):

  1. Follow the Lemmy.world Rules - https://mastodon.world/about

  2. Be kind. No bullying, harassment, racism, sexism etc. against other users.

  3. No Spam, illegal content, or NSFW content.

  4. Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.

  5. Please try and post original sources when possible (as opposed to summaries).

  6. If posting an archived version of the article, please include a URL link to the original article in the body of the post.


Some other hardware communities across Lemmy:

Icon by "icon lauk" under CC BY 3.0

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] CallMeAnAI@lemmy.world 3 points 3 days ago (12 children)

How many times you think a state government uses this vs the thousands of cameras, warrants, a well placed USB stick on the desk, and monitoring the war thunder forums?

I get what you're saying, but in the grand scene of things, even at the state level, these are not how state agencies are spying on you in practical terms.

The effort to just get this executable running undetected in the background for such a low value attack just doesn't make sense to spend resources on.

[–] idiomaddict@lemmy.world 7 points 2 days ago (4 children)

I think they meant international espionage, not spying on the population. That’s at least what I would expect for this.

[–] CallMeAnAI@lemmy.world 1 points 2 days ago* (last edited 2 days ago) (3 children)

And everything I said applies. Especially war thunder forums.

There are higher success rates with more common and easy to achieve tactics.

This might be used on 1 or 2 people. Might.

[–] krooklochurm@lemmy.ca 4 points 2 days ago* (last edited 1 day ago) (1 children)

This kind of stuff is SIGNIFICANTLY more alluring when you're dealing with an air gapped pc.

Interdict the mouse and modify it so that it uses the needed software over usb, pair with a Software Defined Radio device and a specially modified usb plug to exfiltrate any data picked up, the user is none the wiser, you've grabbed whatever info you're after, and you never even need to physically access the air gapped pc.

It's elaborate but if you're targeting an air gapped pc or network then elaborate is necessarily going to be the name of the game.

[–] Jenseitsjens@lemmy.world 2 points 2 days ago (1 children)

If you introduce specially modified hardware, why not just add a microphone?

[–] krooklochurm@lemmy.ca 2 points 2 days ago

If you're looking for something amiss you'd notice a microphone. Unless you really, really, really knew your shit something like this could be essentially invisible even if you disassembled it.

load more comments (1 replies)
load more comments (1 replies)
load more comments (8 replies)