@uranther I’ve been looking to the last 5 years conferences videos of CCC and I couldn’t find yet the one I was talking to you about implementing a persistent hidden channel transmitter in a laptop’s CHIPSET (Northdridge) holding the ethernet controller, by hacking the CHIPSET’s embedded software. This POC / Demo was used to implement a hidden keylogger, but transmitting UUID tag could have been done instead... I’ll find it if it has not been deleted.
@uranther Here it is :
This kind of hardware backdoor is a perfect base to build an "Active fingerprinting tracker".
Be sure all biggest agencies are playing this game.
Instead of using the malware to send keystrokes, you can send those UUID's / Integrated circuits serial numbers and you're done.
He's exploiting a known IP hidden channel, but many other could be used at raw IP level, or in higher protocol layers normalized by W3C.
Tor is a diversion.
@niconiconi @uranther Yep. They withdraw it officially. I’m sure undocumented ones exist. About all subsystems perpherals serial numbers : My article CIA forced me to unpublished focussed mainly on that. There are at least 30 unerasable / unmaskable / unchangeable serial numbers in a standard PC motherboard IC’s and subsystems. Mac address is the only one that is garanteed to be editable because stored in an EEPROM or Flash in most ethernet controllers. That’s no
Server run by the main developers of the project It is not focused on any particular niche interest - everyone is welcome as long as you follow our code of conduct!