/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 8001

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

SHOOT GUNS, EAT BURGERS, BE RACIST! IT'S AMERICA DAY!

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(47.49 KB 1360x768 Anonymous.jpg)

Advanced Untraceable Hidden Camera System Anonymous 05/14/2022 (Sat) 19:29:00 No. 8443
If you were to build a hidden camera system, how would you go about it? I want to build such a system but don't have the skills to put it all together. I do have a few specs in mind and would enjoy your input on how to make it a reality. In terms of applications of such a device... Think the worst case scenario's with the highest level of deniability and near impossible traceability. Even if the device were discovered, stored files would be inaccessible, upstream intermediaries and hosts would be impossible to access. This device can be used as a trail cam, nanny cam, or secondary security cam. This can also be used for spying, like a corporate espionage cam, bathroom/dorm room cam, hotel/airbnb cam, etc. The use, whether for good or evil, is left to the user. The main point is that if properly constructed and properly installed, it would be extremely difficult to detect and likewise to determine who installed it and where it uploaded to. * Camera separate from main system to allow for flexibility in mounting * Camera should be 'pinhole' type to avoid detection (0.5 mm or smaller) * Camera should provide crisp image (highest quality possible given size limitations) * Control unit OS should be open source * Control unit file system must be sufficient to temporarily store recorded media until transferred and verified * Control unit file system should be encrypted * Image and video files should be individually encrypted on device * Media is stored only until transferred and transfer verified * Media is transferred off to secured site, preferably a file drop site over Tor or I2P (the latter preferred, due to file volumes) * Device has internal power with medium to high capacity battery backup * Device has external power input, preferably 5v/2a max requirement (common USB-based mobile device chargers) * Recording is triggered by motion to save on space; continuous recording is not required * Recording loop of previous X seconds and/or a photo per second of 'untriggered' media that is overwritten. * Recording should include ability for audio input; audio input can trigger recording * Device can use WiFi or 4g/5g WAN-based networks for connectivity * Device (optional) can use non-standard WiFi or NFC-type device to connect to a secondary device for network connectivity. * Overall, function of the device should be customizable. For instance, turning encryption on or off, modifying trigger levels for video or audio events, etc. * Device has a limited self-destruct. Something like a motion sensor that would route stored power from the battery or from a capacitor through key parts of the device. * Device tamper trigger, when activated, would result in a short message or file upload indicating same before self-destruct completed. Most recent media, if possible, would be uploaded to show what triggered self-destruct. * Remote access of device is possible, but would require several layers of strong security to prevent unauthorized access. * If enough units deployed and monitored, ability to have remote monitoring station (such as a hidden host on TOR to keep basic health records on devices) * Other options as may come up in this discussion ...
(90.05 KB 596x1060 cam.jpg)

Reading your post and I had come up with something similar a few years back. Adding my notes below but I dont have the skills to put it together. Kind of wish there was a commercially available system with the same security measures. There is a huge demand for devices like this in some places. I dont condone it but in South Korea these are very often used in womens bathrooms (so much so that in Seoul, there are teams that check the bathrooms daily). This would also be good for deployment as a trail cam or security cam. In any role I can see a benefit in separating the device from the owner. If found even a thorough forensic analysis should not provide any useful information that would aid in identifying whomever placed it. Hardware: - Raspberry Pi or Arduino - Camera module - Cellular data module - IR motion sensor (or software based?) - Tamper-resistant self-destruct module (simple, voltage/current driven, massive power surge) - Power source and backup battery - Enclosure Software: - Base OS - Tor or similar? > Need to upload images / video files to secure location (Tor?) > Files uploaded should be encrypted regardless of storage site - Camera control - Encrypted storage (how to unencrypt device in case of reboot once deployed) - File management - Communications management This is pretty much an uneducated sketch of a system but I sure as fuck dont have the skills to put this together. If I were to try it would be by hacking together the hardware, and then combing through Github and other sites to find packages that might work and trying to make them work together. If I were to attempt something like this the outcome would be horrifically unsecure I'm sure.


Forms
Delete
Report
Quick Reply