/t/ - Technology

Discussion of Technology

Index Catalog Archive Bottom Refresh
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

You may also be interested in: AI

(5.38 KB 259x195 images.jpeg)

Take precautions against secret usb implants Anonymous 08/13/2022 (Sat) 08:26:27 No. 9259
I am using Linux operating system. My computer is not connected to the internet , I formatted it and changed the bios firmware and hard disk firmware. However, the program opens by itself, the mouse cursor moves by itself, and sometimes the system's default audio service is turned off. When I examine it with the Wireshark program, an interrupt signal comes from the usb ports, even though there is no device plugged into the usb ports. The interrupt signal comes from linux's default idle hardware. I have a hidden implant in my computer that looks like the NSA ANT COTTONMOUTH tool. Wireshark logs https://easyupload.io/eqrfr6 This hidden usb implant can easily bypass all antivirus and security software by introducing itself as a hidden system process by overflowing the kernel, regardless of linux or windows operating system, during computer startup. On computers that cannot exceed the kernel security, it introduces itself as a different hardware and takes over the control of the system via memory buffer overflow by overloading the interrupt. No antivirus and security software can detect this situation. This hidden usb implant is not simple usb keyboard like ruber ducky and usb ninja. For this reason, do not recommend simple and useless scripts such as "usb guard". This implant is an advanced usb spying implant similar to NSA COTTONMOUTH. My request from the linux community is to develop a security module for the linux operating system against hidden usb implants.
The only way to be safe from CIAniggers it to use templeos on older hardware, assume everything else is compromised and never, ever store sensitive information anywhere electronically.
>>9260 The issue is not to hide information. The issue is to prevent the mouse cursor from moving on its own.
>>9260 >The only way to be safe from CIAniggers is to have more guns and men than them ftfy
youre a fucking retard this is literally how how usb woks you fucking clown, its a fucking network protocol you absolute fucking imbecile modprobe -r usb if you dont want usb you 60iq african
>>9281 The important thing is not the usb, but the PCI devices group to which the usb is connected. I blocked the USB via the GRUB command line. modprobe.blacklist=xhci_pci modprobe.blacklist=ehci_pci usbcore.nousb=Y This time the PC presents itself as a different PCI device during boot up. Don't give advice to turn it off from bios because there is no "disable usb" option in bios.
Which command should we use?


Forms
Delete
Report
Quick Reply