[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20070130173040.7410EDA84A@mailserver8.hushmail.com>
Date: Tue, 30 Jan 2007 12:30:38 -0500
From: <auto458033@...hmail.com>
To: "Simon Smith" <simon@...soft.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: PC/Laptop microphones
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Sounds very technical.
Very advanced analysis, and very good advice. I assume that this
could possibly theoretically effect some legacy cellphones too,
maybe, I think... likely or not? You tell me.
oh shit i need to get back in character.
NIGGERS
On Mon, 29 Jan 2007 22:02:14 -0500 Simon Smith <simon@...soft.com>
wrote:
>Jim,
> In all reality you don't have to be an agent to do this. You
>could just
>write an exploit that when successfully executed would compromise
>the target
>and then fetch an application from a remote site. I'm sure that
>things like
>this have been done in the past. Hell imagine what you could do
>with a web
>cam! ;]
>
> New telephones are no different I'm sure.
>
>On 1/29/07 9:26 PM, "Jim Popovitch" <jimpop@...oo.com> wrote:
>
>> I started this discussion elsewhere, but I feel that there is
>more
>> experience and concern here. When I look at BIOS settings I
>see config
>> options to disable sound cards, USB, CDROM, INTs, etc., but what
>about
>> the PC or laptop microphone? Does disabling the sound card
>remove the
>> availability of a built-in microphone? What if I want to play
>mp3s but
>> never have the need to use a microphone? Given recent info about
>the US
>> FBIs capabilities to remotely enable mobile phone microphones
>> (presumably via corporate cellular service providers), what
>prevents my
>> OS provider (or distribution) and ISP from working on a way to
>listen in
>> on my office or home conversations via the microphone or the
>built-in
>> speakers? Thoughts?
>>
>> -Jim P.
>> _______________________________________________
>> Full-Disclosure - We believe in it.
>> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>> Hosted and sponsored by Secunia - http://secunia.com/
>
>
>_______________________________________________
>Full-Disclosure - We believe in it.
>Charter: http://lists.grok.org.uk/full-disclosure-charter.html
>Hosted and sponsored by Secunia - http://secunia.com/
-----BEGIN PGP SIGNATURE-----
Note: This signature can be verified at https://www.hushtools.com/verify
Version: Hush 2.5
wpwEAQECAAYFAkW/gL4ACgkQgSMOKd40iZjHjAP/dQT6SyG0ecFnyoUIv6LJG5pAHN3K
5uLZo5pqTW9oOsyQAosU7wYvCHh5QnYSvCMud7r8I7V6tRABbDqSiw4eg8X43fZ7/r0o
FhqkbKfAdsaGJjT+ybVNISyXqjHbYx6UV1JVWXKC8ofYdsGjwcw3lNNsUDxudHWT69Hw
MS/FK1k=
=Gso2
-----END PGP SIGNATURE-----
Concerned about your privacy? Instantly send FREE secure email, no account required
http://www.hushmail.com/send?l=480
Get the best prices on SSL certificates from Hushmail
https://www.hushssl.com?l=485
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists