Two department heads within a reclamation department of the US Department of 
Defense told me circa 2013 that SAP had discovered a wireless vulnerability in 
USB memory sticks. 

I know you guys lean heavily on using USB memory sticks to boot your live linux 
distribution, thinking it's safe from spying, but nothing could be further from 
the truth. 

I recommend instead using a live DVD with the kernel option TORAM used to load 
your OS. Then figure out a way to mount your storage over the network from 
somewhere else. Perhaps with a ram drive overlay. 

I remember a wifi card back around 2007 that had a vulnerability that allowed 
remote access to the whole motherboard - no matter the OS or driver. There is 
every reason to suspect that the sort of back door we are talking about here 
could have such wide access. 

These are undocumented wireless methodologies as far as I know. 

The officers told me this was how the US Government caused the Iranian uranium 
enrichment machines to spin to speeds far above the speeds they were suposed to 
spin at. These supposedly "air-gapped" machines were using USB flash drives. 
They went on to say the only reason they could tell me was because SAP had made 
the discovery public so it was no longer classified information. 

The DOD does not allow usb Flash Drives on it's networks. It might be advisable 
to follow their policies for data management. 

I told Bob Stanley of FreeOS about this circa 2018 in Acapulco, Mexico, and he 
wanted me to not talk about it. FreeOS was re-branding Tails and making a 
privacy centric tool and economic infrastructure around the DASH crypto 
currency. 

I've continued posting about this from time to time sharing this information 
with those whom I felt it important to share with. I told some people in the 
Bitcoin Meetup of Silicon Valley where I was a co-organizer. 

Regards, 
Joseph William Baker® 
[ https://josephwilliambaker.com/ | https://JosephWilliamBaker.com ] 


_______________________________________________
Tails-dev mailing list
[email protected]
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to