Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-12-07 Thread 'awokd' via qubes-users

Andrew David Wong:

Since I never planned to use the voice features, I simply found a sewing 
needle, inserted it into the mic hole, and used a flat piece of hard 
plastic on the other end to apply moderate force. There was a single 
"click" sound. After that, voice commands were no longer recognized by 
the TV, but the remote and everything else still worked perfectly. 


Reminds me of a lobotomy procedure.

Thread related- if you want a big screen picture, but not "smarts", 
sometimes projectors can be the way to go.


--
- don't top post
Mailing list etiquette:
- trim quoted reply to only relevant portions
- when possible, copy and paste text instead of screenshots

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/6fcb60ce-0861-2e2d-085a-99777fc483cf%40danwin1210.me.


Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-28 Thread Andrew David Wong

On 11/27/20 7:08 PM, Steve Coleman wrote:

[...]
1. TV's are often encoded to deliberately export use intelligence data to
be utilized by the advertisers and ratings organizations. The camera and
microphone, if installed, are actually designed and used to watch and
listen to the family watching the programs. Zero privacy, and you may even
have no way to disconnect it, so denying it any network access is your only
hope to stop exfiltration.


Physically disabling the camera and microphone may be an option in some 
cases. Cameras can be covered, but covering a microphone doesn't do 
much. I recently got a new smart TV that has a microphone in the remote. 
Since I never planned to use the voice features, I simply found a sewing 
needle, inserted it into the mic hole, and used a flat piece of hard 
plastic on the other end to apply moderate force. There was a single 
"click" sound. After that, voice commands were no longer recognized by 
the TV, but the remote and everything else still worked perfectly. 
Hopefully that's good enough.


By the way, this reminds me of when Joanna removed all the microphones 
and front camera from her iPhone:


https://twitter.com/rootkovska/status/547496843291410432

--
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/7c8dcda4-9504-4942-3431-00bc022f70db%40qubes-os.org.


OpenPGP_signature
Description: OpenPGP digital signature


Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-27 Thread River~~
hi Steve

Steve:
> Without a Nation State being involved, the most likely threat would come
> from a permiscuous WiFi in the TV auto-connecting to any open networks in
> your area.

Good point. Which links to my thought if you wanted to keep a Qubes
box secure it would be a really BAD idea to plug it into someone
else's TV (like in a motel for example) or a conference room
projector.

My mitigation at home is to use the oldest flat panel TV I can find;
however that has its own difficulties (not security-related but to do
with the picture overscanning the screen).

> If you are sure that is not the case then it should be 'safe
> enough' for most people.
> Side channel attacks take tools, skills, and physical location that isn’t
> going to happen without you already being a target of some kind. It you are
> a target then no monitor is going to help and its time to unplug your
> computer.

There are degrees of Nation State interest ahd more than one level of
being a target; it is not all or nothing.

Presumably the top three tiers of interest are other Nation States
(especially those perceived as hostile), suspected terrorists, and
suspected paedophiles. Below that (I hope) in a fourth level would
come people with a non-violent agenda for significant political
change.

We know that many well known states put effort in to infiltrating such
groups in this fourth level -- to the extent where (for example) State
Infiltrators have been known to have long term, child procreating,
relationships with female activists while popping home to see their
real wives when they can -- so it is reasonable to suppose that there
is also some cyber-infiltration to their computers as well. Equally it
would be paranoid to imagine that any Nation State throws the full
range of their surveillance capability at every individual identified
with such groups.

> I once saw one demo years ago where the target machine with no
> known public vulnerabilities at the time was rooted in less than 15s. They
> don't play around.

Agreed -- in fact it is worse than that.

Those who know how to access to the Intel ICE processor or the AMD
equivalent (whose name I forget) have millisecond access whenever they
want it whenever an Intel or AMD machine is directly net-connected or
connected via routers that are themselves compromised in other ways.
That is after all the hidden-in-plain-sight message on the sticker:
Intel Inside ;) and why Qubes certify so few recent machines.

Apart from avoiding TV's that connect to random unknown Wifi or that
are owned by someone else, I think that I would have to stop using a
recent AMD box other risks of entry via the TV became the biggest
security issue.

Warmly,
R~~

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAK3jUKoeZTXOFrCEjza3zg%2Bd89qYiB8aZyO29bTYrun0ZFH3rQ%40mail.gmail.com.


Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-27 Thread Steve Coleman
On Fri, Nov 27, 2020, 6:01 PM Alex Smirnoff  wrote:

> Assuming poor software quality of typical TV firmware and codecs, DVB
> should be pretty easy exploitable. However, I doubt a compromised TV could
> do serious harm to your computer via HDMI. Speaking on your demo.. there is
> a lot of factors to be involved. Chaining a Xen exploit to Chrome might be
> possible.. but unprobable, for a multitude of reasons.
>

My reasoning about the WiFi was three fold.

1. TV's are often encoded to deliberately export use intelligence data to
be utilized by the advertisers and ratings organizations. The camera and
microphone, if installed, are actually designed and used to watch and
listen to the family watching the programs. Zero privacy, and you may even
have no way to disconnect it, so denying it any network access is your only
hope to stop exfiltration.
2. Having a presence on any network leaves it open to external exploit
where the above sensors are available for surveillance of the target family.
3. More recent sets are actually programmable, from the network, and can
have software (e.g. android) apps or plugins installed by the adversary
which that app then has complete access to all the features of the set
including the display buffers,  sensors, and network. Its a computer in its
own right and should be treated as such.

If the TV set programmers coded the it to auto connect to any available
open WiFi then that set is actually dangerous, as it can give a foothold
from which to attack other machines on that network. If its your own
network that is doubly bad news.

The question remaining is what can the adversary then do to communicate
back through the video connection. Hdmi is bidirectional so buffer overflow
exploits are clearly possible. But no matter what, one simply has to assume
the adversary already has what is displayed on the screen.

Denial of network access is the key to keeping *most* adversaries out.
Testing the sets WiFi situation would be the absolute bare minimum to be
sure you are safe (enough?). But if you think you are being targeted by
some advanced adversary for some reason then I would simply not use one of
these as a monitor. There are just too many ways to hack one.

I can not discuss that specific demo I previously spoke about other than to
say, I know exactly what they did, and they can not use that same trick
today. I have worked with people quite capable of waltzing through your
system and you wouldn't know they were there. They reverse engineer
hardware and play a form of "capture the flag(the file contents stored on
some chosen hardware/machine)" for fun and recognition, and the choice of
hardware is often quite amusing. Spooks like to have fun too. I'm retired
now, but the stories I could tell if I were only allowed to.

I'll just say there is a reason I use qubes.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDngisj%3Dk5phFVYhbO_89uK4grDDdDRb-xEbhYNyZYsswnw%40mail.gmail.com.


Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-27 Thread Alex Smirnoff
Assuming poor software quality of typical TV firmware and codecs, DVB 
should be pretty easy exploitable. However, I doubt a compromised TV could 
do serious harm to your computer via HDMI. Speaking on your demo.. there is 
a lot of factors to be involved. Chaining a Xen exploit to Chrome might be 
possible.. but unprobable, for a multitude of reasons.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/c80eeb69-3fde-40aa-a0b2-e496aecfab4bn%40googlegroups.com.


Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-27 Thread Steve Coleman
Without a Nation State being involved, the most likely threat would come
from a permiscuous WiFi in the TV auto-connecting to any open networks in
your area. If you are sure that is not the case then it should be 'safe
enough' for most people.

Side channel attacks take tools, skills, and physical location that isn’t
going to happen without you already being a target of some kind. It you are
a target then no monitor is going to help and its time to unplug your
computer. I once saw one demo years ago where the target machine with no
known public vulnerabilities at the time was rooted in less than 15s. They
don't play around.

On Wed, Nov 25, 2020, 9:31 AM River~~  wrote:

> Hi all
>
> In the days of CRT monitors one way the security of a computer system
> could be compromised non-intrusively (ie without amending the
> installed code) was by picking up the radio-frequency leakage from the
> tube in the monitor. This could only be done from near by, but where
> possible it enabled the spy to see what was on the screen -- almost
> everything that you typed (aprt from passwords that were blanked or
> starred out). This was a remote form of shoulder surfing, where
> someone looks over your shoulder in an environent like an internet
> cafe.
>
> Nowadays we do not have to worry about CRT monitors. But TVs are
> increasingly delivered with their own internet connection, making it
> easy to watch You-Tube (etc) without needing a separate computer or
> phone. Clearly there is a computer inside which can be hacked, and if
> so a remote shoulder surfing attack would be very possible.
>
> Is the same true of monitors and of TVs that do not have an apparent
> internet link? The digital tech to draw a picture from the input is
> unlikely to be done by traditional electronics, but being all digital
> is likely done by a miniporcessor of some kind in all digital
> displays.
>
> To put my question in the most provocative way on this forum: if there
> much point securing the OS when the monitor might be an easier target
> for those out to (umm) monitor our reading and our keystrokes?
>
> This thught has only just come to me, and I wonder if there is already
> some available mitigation? Any ideas?
>
> Or am I being overly cautious?
>
> R~~
>
> Any ideas?
>
> --
> You received this message because you are subscribed to the Google Groups
> "qubes-users" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to qubes-users+unsubscr...@googlegroups.com.
> To view this discussion on the web visit
> https://groups.google.com/d/msgid/qubes-users/CAK3jUKoDK8kX2jhx3J-m%3D-%3DrRdVxpX7uaJCa5emwpXdSm-CWxg%40mail.gmail.com
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAJ5FDngOV7EN4Vu4LT0bpPiRUKd01X-kCZZUD7OgRng634hLUw%40mail.gmail.com.


Re: [qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-26 Thread Andrew David Wong

On 11/25/20 6:31 AM, River~~ wrote:

Hi all

In the days of CRT monitors one way the security of a computer system
could be compromised non-intrusively (ie without amending the
installed code) was by picking up the radio-frequency leakage from the
tube in the monitor. This could only be done from near by, but where
possible it enabled the spy to see what was on the screen -- almost
everything that you typed (aprt from passwords that were blanked or
starred out). This was a remote form of shoulder surfing, where
someone looks over your shoulder in an environent like an internet
cafe.

Nowadays we do not have to worry about CRT monitors.


This is known as a TEMPEST attack:

https://en.wikipedia.org/wiki/Tempest_(codename)

Although we may not use CRT monitors any more, there are still many 
other forms of this attack, many of which are still relevant today. It's 
still important to be mindful of any kind of leaking emanation.



But TVs are
increasingly delivered with their own internet connection, making it
easy to watch You-Tube (etc) without needing a separate computer or
phone. Clearly there is a computer inside which can be hacked, and if
so a remote shoulder surfing attack would be very possible.



Yes, definitely. Smart TV spying is already a widely-reported phenomenon:

https://duckduckgo.com/?q=smart+tv+spying


Is the same true of monitors and of TVs that do not have an apparent
internet link? The digital tech to draw a picture from the input is
unlikely to be done by traditional electronics, but being all digital
is likely done by a miniporcessor of some kind in all digital
displays.



It's impossible to say without knowing exactly what kind of hardware is 
inside.



To put my question in the most provocative way on this forum: if there
much point securing the OS when the monitor might be an easier target
for those out to (umm) monitor our reading and our keystrokes?

This thught has only just come to me, and I wonder if there is already
some available mitigation? Any ideas?

Or am I being overly cautious?

R~~

Any ideas?



Well, there's no such thing as perfect security, but you can decrease 
your risk here in multiple ways, such as selecting a monitor with as few 
"smart" features as possible or, if you use a laptop, sticking with the 
built-in monitor. There might also be some advantage to preferring 
"dumb" ports on your monitor. For example, DisplayPort and Thunderbolt 
are probably bigger risks than VGA and DVI, since DisplayPort can 
transmit USB and other data, and Thunderbolt combines PCIe and DisplayPort.


--
Andrew David Wong (Axon)
Community Manager, Qubes OS
https://www.qubes-os.org

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/b0126b42-d45f-80fb-c783-b30a0202e8cf%40qubes-os.org.


OpenPGP_signature
Description: OpenPGP digital signature


[qubes-users] Are "smart" monitors/TVs a security issue?

2020-11-25 Thread River~~
Hi all

In the days of CRT monitors one way the security of a computer system
could be compromised non-intrusively (ie without amending the
installed code) was by picking up the radio-frequency leakage from the
tube in the monitor. This could only be done from near by, but where
possible it enabled the spy to see what was on the screen -- almost
everything that you typed (aprt from passwords that were blanked or
starred out). This was a remote form of shoulder surfing, where
someone looks over your shoulder in an environent like an internet
cafe.

Nowadays we do not have to worry about CRT monitors. But TVs are
increasingly delivered with their own internet connection, making it
easy to watch You-Tube (etc) without needing a separate computer or
phone. Clearly there is a computer inside which can be hacked, and if
so a remote shoulder surfing attack would be very possible.

Is the same true of monitors and of TVs that do not have an apparent
internet link? The digital tech to draw a picture from the input is
unlikely to be done by traditional electronics, but being all digital
is likely done by a miniporcessor of some kind in all digital
displays.

To put my question in the most provocative way on this forum: if there
much point securing the OS when the monitor might be an easier target
for those out to (umm) monitor our reading and our keystrokes?

This thught has only just come to me, and I wonder if there is already
some available mitigation? Any ideas?

Or am I being overly cautious?

R~~

Any ideas?

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/CAK3jUKoDK8kX2jhx3J-m%3D-%3DrRdVxpX7uaJCa5emwpXdSm-CWxg%40mail.gmail.com.