Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

If the mechanism is believed to be thermal, then this is 4-6 orders of magnitude more powerful than WiFi. It's like removing the cavity from a microwave oven and blasting it at someone. This is horrifying.


sort by: page size:

> My neighbours wifi router sends "powerful electronic signals" into my private home every day.

Making your phone use max power to emit information is nothing like the wifi radiation you get from your neighbors.


It's very scary shit. We could soon have no privacy at all in our own homes because of other people's WiFi networks. If the output is strong enough, all you have to do is connect to/crack someone's WiFi and use it to get a layout of all their neighbor's places.

I had no idea about this and the implications are truly terrifying and amazing.

Its not just wifi at home the entire world is now a big mesh network. So theoretically it means literally everything everywhere which has wifi coverage can now be tracked with amazing accuracy. Quite possibly the most scary/invasive tech.


It's not wifi. There's literally no way for you to detect it and there are other, stronger radio signals constantly bombarding you.

> My neighbours wifi router sends "powerful electronic signals" into my private home every day.

But it isn't sent by government agents "in order to collect information from within", which is a key factor in the description.


WiFi is trivial to jam... Just run a microwave with a pencil wedged in the door hinge and nobody will be using 2.4g WiFi anywhere in the same block.

Deauth attacks are a distraction.


That's a bad analogy for an unsecured wifi. Wifi is radiated energy in radio spectra. They're not looking through your window; you're shining a flashlight through your walls and they wrote down the pattern you're strobing into the street (and that pattern isn't even secret; you're using the common pattern everyone uses to send messages intended to be universally understood).

Did I read the article correctly in that it is possible to disrupt WiFi networks to make devices disconnect from it, without breaking its encryption? Wow.

Well this is terrifying. Pretty soon you'll have to crack open your appliances to snip the antennas to prevent them from calling home, rather than just not giving them the wifi password...!

Ugh this is way worse and actually seems far more likely and easy to accomplish than the public wifi thing...

There's nothing decent about WiFi that links your customers to the creepiest personal info vacuum on earth.

If that was your vector, you wouldn’t bother with wifi at all.

I think the real value of this attack is against air-gapped computers... that people charge their wireless devices with? That would be stupid.


Yeah the majority of them aren't Wifi lightbulbs afaik it's mostly routers and other similar devices, so they really do have the power of a low-mid range smartphone.

Realistically though as long as it can send a request I think attackers would prefer lower power devices someone's computer may be able to send many more r/s but much harder to gain control of versus the $30 iot device.


> The Wi-Fi radio runs on extremely low power by transmitting data via a technique called backscattering. It takes incoming Wi-Fi signals from a nearby device (like a smartphone) or Wi-Fi access point, modifies the signals and encodes its own data onto them, and then reflects the new signals onto a different Wi-Fi channel to another device or access point.

Seems like this chip is purpose built for surreptitious surveillance.


Pretty sure that the datastream is encrypted. Being able to sniff your neighbor's power consumption from far away is a pretty large security hole.

Title is misleading. This isn't generating Wi-Fi signals. It's generating non-Wi-Fi signals (i.e. effectively noise) in the Wi-Fi frequency bands, in a way that encodes information and can be detected using existing Wi-Fi chipsets (e.g. measuring channel noise), as a very low bandwidth communications channel.

The bit rate with off the shelf Wi-Fi chipsets as receivers is ~10 bits per second.

This is definitely interesting and clever, but as a security researcher I will say I consider this particular research lab a bit of a paper mill. Their entire schtick is they pick any random emission from a computer that can be picked up remotely, and hype it up as an airgap-defeating measure. The thing is, once you accept that either 1) if your air-gapped computer has malware that can do this, you've already lost, or 2) if you need to be resilient to that, your "air gap" needs to be a sealed vault insulated from sound, EMI, and any other physical transmission medium, then this whole body of research becomes purely academic.

IIRC they've done LEDs, temperature, inductor noise, ultrasound, etc. When I first started looking into this I could come up with a good dozen of their ideas without looking. Of course all this stuff works. It's cute, it's clever, but it's not particularly obscure nor difficult to make work, and it all relies on having malware on the target machine to begin with. Yes, computers are noisy beasts, and you can encode information in the noise; we've known this for decades, picking a new technique and implementing it isn't particularly interesting after the fifth or sixth time.

Personally, I find their techniques primitive and boring. Like here, they set the RAM bus frequency to 2.4GHz (DDR-2400). Yes, of course, if you do that, then RAM traffic generates noise in the Wi-Fi band. Then they just used the most boring and trivial encoding possible on top of that. I don't remember ever reading one of their papers and thinking they'd used a clever technique. It always seems to be "pick a leak vector, then do the least amount of work possible to make it work at a few bits per second and get a paper out".

The interesting side channel papers are those where you can get information from emissions (e.g. crypto keys) without malware on the target computer, during normal operation. Those are real threats. And this is not what this group is researching.


And not-so-legitimate devices.

I've got a cheap Chinese 2.4GHz analog video transmitter in a box somewhere which is _way_ overpowered (600mW from memory, instead of the legal max of 25mW) it completely knocks out all my 2.4GHz wifi when I switch it on (and I strongly suspect all my neighbour's wifi as well). I've got much a less overpowered 5GHz which my 5GHz wifi doesn't seem to care about.


This is an automatic bluetooth pairing attack. With the right equipment (which can be as simple as a Pringles can and an antenna aimed through a window) you can execute this attack from a hundred meters away. That's not physical access.

This is disgusting, if true. That should clearly be illegal. (Though every wifi network should have a password at this point...)
next

Legal | privacy