Difference between revisions of "Threats and solutions"

From Gender and Tech Resources

(Created page with "Theoretical defenses and detection methods for a selected group of leaked surveillance programs and services. Due to the age and limited scope of the leaked documents, the def...")
 
(Replaced content with " ")
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
Theoretical defenses and detection methods for a selected group of leaked surveillance programs and services. Due to the age and limited scope of the leaked documents, the defenses covered in these tables should not be relied upon for protection and I make no guarantees to their accuracy. You need to do research in your own environment as to what new developments there are. Things move incredibly fast in this arena and I will update these tables when more is found and/or theorised.
 
  
This is just a thought experiment covering theoretical defenses against these attacks and not intended to spread fear, uncertainty or doubt about surveillance states.
 
 
== Router ==
 
 
Table was initially filled with threats listed on the SpiderBlog, then updated with the latest info. (June 2015)
 
 
{| class="wikitable"
 
|-
 
! !! More information !! Header text !! Header text
 
|-
 
| Godsurge: a physical device plugged-in to the Joint Test Action Group or JTAG headers on a system's motherboard || JTAG headers can be found on many systems and are notoriously common in embedded devices. These headers are used during the development process for debugging purposes: they give you a direct interface with the CPU and are extremely helpful. They are commonly left on the production boards, so finding them on a device is normal and not a security concern. However, if there is a chip or board wired in to a device's JTAG headers that you did not wire in yourself, then something fishy may be going on. || Getting Terminal Access to a Cisco Linksys E-1000 <ref>Getting Terminal Access to a Cisco Linksys E-1000 http://blog.spiderlabs.com/2012/12/getting-terminal-access-to-a-cisco-linksys-e-1000.html</ref> &  Oops, I pwned your router <ref>Oops, I pwned your router http://blog.spiderlabs.com/2012/06/oops-i-pwned-your-router.html</ref>|| look for the JTAG connecter on the motherboard. The location of the JTAG headers may differ, but they tend to be near the CPU and may have exposed pins (or not). See the Wikipedia page on JTAG for more information and to see what they look like <ref>Wikipedia JTAG http://en.wikipedia.org/wiki/Joint_Test_Action_Group</ref>
 
|-
 
| Example || Example || Example || Example
 
|-
 
| Example || Example || Example || Example
 
|-
 
| Example || Example || Example || Example
 
|-
 
| Example || Example || Example || Example
 
|}
 
JTAG
 

Latest revision as of 09:57, 6 June 2015