IWETHEY v. 0.3.0 | TODO
1,095 registered users | 0 active users | 0 LpH | Statistics
Login | Create New User
IWETHEY Banner

Welcome to IWETHEY!

New Why I bought a laptop
Karsten wrote:

Don't overlook hardware. Keystroke sniffers are now dime-sized or smaller, capable of holding MBs worth of output, or months worth of typing. If you're going to be paranoid, don't stop at half-measures.

Reminds me. There was a time when I was chief sysadmin at $FIRM, an outfit in San Francisco. The moment $CTO came aboard, all manner of odd things seemed to be happening on the LAN, leading to the strong justifiable suspicion that he was tapping all e-mail in or out of the company, right at the switch, primarily in order to monitor discussions among other members of the executive staff that might affect his... interests. (I wish we could talk about the $12M in contracts given largely to firms in which he had undisclosed ownership interests. Can we use bad words like "embezzlement"? Hmm, probably not.)

Anyhow, I had a pretty good notion about what the gentleman was doing, without exact confirmation, and found that it, um, didn't meet my needs. I saw no reason I shouldn't have reliable, private communications between my desk at work and my server at home. Given such a channel, I could then reach out from home to any further locations, without $CTO having any access to my affairs.

So, I sat down and considered threat models. My apartment at The CoffeeNet? Not impervious, but good enough. The various wires between my cubicle and my apartment? Assumed hostile and compromised -- but fortunately SSH (properly used) makes that irrelevant to privacy, leaving only DoSing, which didn't seem to be a problem in that case. My workstation on my desk? Oh-oh.

As you said, hardware can be compromised pretty easily. So can unattended software to which the bad guys have physical access -- and I knew that it only seemed like I was at my desk 24 hours a day. If $CTO wanted to bug my Debian workstation, he might be able to do that without my being able to easily tell. Or he could put in a hardware-level keyboard sniffer, with much less effort, and I wouldn't likely find that at all.

The guy probably wouldn't bother, but I realised that there was an easy way to eliminate all those possibilities: I bought a used Sony VAIO PCG-505TX, installed Debian on it, and used it (only) for any computing for which I wanted privacy and assurance of personal control.

These days, a Knoppix CD is about 7/8 of a loaf. The bad guys' options at the level of your workstation's software just about vanish. Others exist, but you've picked most of the low-hanging fruit.

Rick Moen
rick@linuxmafia.com


If you lived here, you'd be $HOME already.
Collapse Edited by rickmoen Dec. 13, 2002, 02:13:59 PM EST
Why I bought a laptop
Karsten wrote:

Don't overlook hardware. Keystroke sniffers are now dime-sized or smaller, capable of holding MBs worth of output, or months worth of typing. If you're going to be paranoid, don't stop at half-measures.

Reminds me. There was a time when I was chief sysadmin at $FIRM, an outfit in San Francisco. The moment $CTO came aboard, all manner of odd things seemed to be happening on the LAN, leading to the strong justifiable suspicion that he was tapping all e-mail in our out of the company, right at the switch, primarily in order to monitor discussions among other members of the executive staff that might affect his... interests. (I wish we could talk about the $12M in contracts given largely to firms in which he had undisclosed ownership interests. Can we use bad words like "embezzlement"? Hmm, probably not.)

Anyhow, I had a pretty good notion about what the gentleman was doing, without exact confirmation, and found that it, um, didn't meet my needs. I saw no reason I shouldn't have reliable, private communications between my desk at work and my server at home. Given such a channel, I could then reach out from home to any further locations, without $CTO having any access to my affairs.

So, I sat down and considered threat models. My apartment at The CoffeeNet? Not impervious, but good enough. The various wires between my cubicle and my apartment? Assumed hostile and compromised -- but fortunately SSH (properly used) makes that irrelevant to privacy, leaving only DoSing, which didn't seem to be a problem in that case. My workstation on my desk? Oh-oh.

As you said, hardware can be compromised pretty easily. So can unattended software to which the bad guys have physical access -- and I knew that it only seemed like I was at my desk 24 hours a day. If $CTO wanted to bug my Debian workstation, he might be able to do that without my being able to easily tell. Or he could put in a hardware-level keyboard sniffer, with much less effort, and I wouldn't likely find that at all.

The guy probably wouldn't bother, but I realised that there was an easy way to eliminate all those possibilities: I bought a used Sony VAIO PCG-505TX, installed Debian on it, and used it (only) for any computing for which I wanted privacy and assurance of personal control.

These days, a Knoppix CD is about 7/8 of a loaf. The bad guys' options at the level of your workstation's software just about vanish. Others exist, but you've picked most of the low-hanging fruit.

Rick Moen
rick@linuxmafia.com


If you lived here, you'd be $HOME already.
     Seeking serious opinions - advice - (dmarker) - (29)
         Perhaps some separation of duties. - (static)
         is the win2k installed locally produced recently? - (boxley) - (1)
             Re: iGood point Bill - go head to head - (dmarker)
         Re: Is it possible to hide programs on someone computer - (dmarker) - (13)
             Hidden directories? - (Ashton) - (3)
                 Re: Hidden directories? - (dmarker) - (2)
                     OT: About your PIC... - (folkert) - (1)
                         Re: That Pic (grin) Miss HK 2000 - I used it - (dmarker)
             you have been smacked - (boxley) - (1)
                 Re: Hmmm that does it - will reinstall from scratch - (dmarker)
             Forensics - (kmself)
             Re: Is it possible to hide programs on someone computer - (deSitter) - (4)
                 Hidden files & really hidden files ... - (dmarker) - (3)
                     could you forward a copy of the virus to me? - (boxley)
                     "Opening" attachments - (rickmoen)
                     Obvious flaw - (rickmoen)
             Hey Doug, - (jb4)
         Goal? - (kmself) - (2)
             Re: Goal? - At the moment is to figure out what thyz up 2 - (dmarker)
             Why I bought a laptop - (rickmoen)
         Have you tried Spybot Search & Destroy? - (Another Scott) - (6)
             Re: Downloaded & will try - looks good - (dmarker)
             Re: Interesting results - (dmarker) - (3)
                 Most of the found items are just information. - (Another Scott)
                 Re: Doug's strange new fascination with Re: - (tseliot) - (1)
                     Not new by any stretch of imagination... -NT - (hnick)
             Re: Have you tried Spybot Search & Destroy? - (dmarker)
         Re: Seeking serious opinions - advice - (rickmoen)
         FYI: XP & Zonealarm - holey shit - (kmself)

Give me someone I can vote for is all I ask.
81 ms