
Sign up to save your podcasts
Or
How to remove microphone, bluetooth, WiFi, webcam / camera on your laptop. Follow for any similar laptop model, once you find the placement of the microphone, bluetooth, wifi, camera. This video uses a Lenovo Thinkpad X230 for our example machine. An attacker cannot gain access without psysical, or remote access hardware on a machine (most have no clue about SC attacks).
We know (example: stories like pegasus) our hardware can potentially be turned against us when malware strikes.
If our devices acquire said malware, a few key pieces of hardware could be EASILY turned against us (and others, but this is most common):
Our microphone can be turned into a hidden bug in our home.
Our webcams can be used a surveillance cameras to watch our every move when the laptop lid is open.
Our WiFi / bluetooth devices send out radio beacons, sharing everything from signal strength to narrow down location, all the way to details on our pattern of life (bssid tracking). And if compromised, could even allow for other types of data / compromise smuggling.
Without the above hardware devices, without networking, our devices are much less easily tracked - almost invisible... though there are other types of unique fingerprint, as we will continue covering on this channel.
FOR SECURITY BENEFIT:
This also brings into play great security benefits - so much in targeted attacks rely upon prediction of target behavior / accessibility.
From finding devices to compromise, to opening remote backdoors. Your hardware network / wireless devices can easily be turned against you.
Without networking / wireless access, attacks are much less likely (but not impossible if you give someone physical access / other means).
By removing these, we take greatly reduce accessibility for the 'bad guys'.
#cyber #tracking #laptop
If you believe this type of info / content matters, thank you for sharing it.
🌞 After putting thousands of hours into hundreds of videos, I need your help with algorithm commenting, liking, SHARING video, to continue channel into the future.
Let's peacefully hack the algorithm, by commenting, sharing this video, and don't forget to Like it!
SUPPORT INDEPENDENT CONTENT (help channel continue):
MEMBERSHIP: https://bmc.link/politictech/membership
I share techniques on privacy, anonymity, and security to help protect human rights, journalism, OSINT investigators.
Because I truly believe the greatest power we have is our ability to selectively reveal ourselves to the world (privacy).
Our data is captured by all possible means today. From network metadata, to the radio based wireless devices we carry in our pockets / handbags.
How to remove microphone, bluetooth, WiFi, webcam / camera on your laptop. Follow for any similar laptop model, once you find the placement of the microphone, bluetooth, wifi, camera. This video uses a Lenovo Thinkpad X230 for our example machine. An attacker cannot gain access without psysical, or remote access hardware on a machine (most have no clue about SC attacks).
We know (example: stories like pegasus) our hardware can potentially be turned against us when malware strikes.
If our devices acquire said malware, a few key pieces of hardware could be EASILY turned against us (and others, but this is most common):
Our microphone can be turned into a hidden bug in our home.
Our webcams can be used a surveillance cameras to watch our every move when the laptop lid is open.
Our WiFi / bluetooth devices send out radio beacons, sharing everything from signal strength to narrow down location, all the way to details on our pattern of life (bssid tracking). And if compromised, could even allow for other types of data / compromise smuggling.
Without the above hardware devices, without networking, our devices are much less easily tracked - almost invisible... though there are other types of unique fingerprint, as we will continue covering on this channel.
FOR SECURITY BENEFIT:
This also brings into play great security benefits - so much in targeted attacks rely upon prediction of target behavior / accessibility.
From finding devices to compromise, to opening remote backdoors. Your hardware network / wireless devices can easily be turned against you.
Without networking / wireless access, attacks are much less likely (but not impossible if you give someone physical access / other means).
By removing these, we take greatly reduce accessibility for the 'bad guys'.
#cyber #tracking #laptop
If you believe this type of info / content matters, thank you for sharing it.
🌞 After putting thousands of hours into hundreds of videos, I need your help with algorithm commenting, liking, SHARING video, to continue channel into the future.
Let's peacefully hack the algorithm, by commenting, sharing this video, and don't forget to Like it!
SUPPORT INDEPENDENT CONTENT (help channel continue):
MEMBERSHIP: https://bmc.link/politictech/membership
I share techniques on privacy, anonymity, and security to help protect human rights, journalism, OSINT investigators.
Because I truly believe the greatest power we have is our ability to selectively reveal ourselves to the world (privacy).
Our data is captured by all possible means today. From network metadata, to the radio based wireless devices we carry in our pockets / handbags.