Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

https://twitter.com/assortedhackery/status/12000566338980290...

Actual measurement that a Pi with HDMI at the affected reoslutions radiates over the bottom end of the wifi band.



sort by: page size:

Recent and related:

WiFi can read through walls - https://news.ycombinator.com/item?id=37469920 - Sept 2023 (171 comments)


https://arxiv.org/pdf/2207.04859.pdf

802.11bf is a thing. It doesn’t seem completely out of the picture for such a technology to be abused once it is implemented.


> My neighbours wifi router sends "powerful electronic signals" into my private home every day.

Making your phone use max power to emit information is nothing like the wifi radiation you get from your neighbors.


> Impact: An attacker within range may be able to execute arbitrary code on the Wi-Fi chip"

That's a major problem!


> This set of vulnerabilities requires a potential attacker to be physically within range of the Wi-Fi network

I have troubles imagining an attack on wifi protocol where this doesn't apply :).


> Human identification through wifi signals

It is already easy to track anyone who owns a smartphone.

Probe requests broadcast the MAC address: https://medium.com/@brannondorsey/wi-fi-is-broken-3f6054210f...


> This has to work even if network reception is weak or absent.

Or hacked maliciously.


Related discussion 7 days ago:

WiFi can read through walls

https://news.ycombinator.com/item?id=37469920 (171 comments)


I'm not really on wifi good enough to reply extensively, but I pushed an update to the post explaining this better. If you carry out the read explicitly, you can still get the anomaly in much the same way. I should've done so from the beginning, but I tried to simplify the argument and went too far.

I'm not really on wifi good enough to reply extensively, but I pushed an update to the post explaining this better. If you carry out the read explicitly, you can still get the anomaly in much the same way. I should've done so from the beginning, but I tried to simplify the argument and went too far.

I'm not really on wifi good enough to reply extensively, but I pushed an update to the post explaining this better. If you carry out the read explicitly, you can still get the anomaly in much the same way. I should've done so from the beginning, but I tried to simplify the argument and went too far.

> The adversary has a limited ability to monitor short-range communication channels (Bluetooth, WiFi, etc).

That seems like a pretty big assumption. From what i understand there already exists deployment of wifi hot spots to track people (both for advertising purposes and for spying purposes) to the extent that phone providers started radomizing MAC addresses.


> Sometimes they will seek out nearby open WiFi networks to join

[Citation Needed]


https://www.businessinsider.com/a-san-francisco-apartment-th...

Instead of going to such extreme lengths though, it's more sensible to lobby for political change. There is absolutely no legitimate reason this should be introduced as a general standard for all wifi divices. This sort of spying needs to be illegal unless specifically approved in limited cases.


more like "Wifi can read big metal Home Depot sign letters through walls from reasonably close"

good proof of concept tho, and a cool video


Reminds me of Wi-Vi: See Through Walls with Wi-Fi Signals from 2013:

http://people.csail.mit.edu/fadel/wivi/


https://blogs.technet.microsoft.com/networking/2008/02/08/no...

tl;dr from the article:

> If the network name of a wireless network (SSID) is not broadcast, the clients must search for it with probe requests. So if you have one AP and 100 wireless devices, you partially limit exposure of the network name with one device while causing 100 devices to expose it instead.


In case someone reads the cached version, I added a note about my point about Wifi after it was brought up that the attacker could be the Wifi provider itself so refresh the page.

something similar from the same blog about a malicious raspberry pi in a network closet and in the end the person who put it there was found out because their wifi credentials were still in the Pi

https://blog.haschek.at/2019/the-curious-case-of-the-RasPi-i...

next

Legal | privacy