The trojan horse is activated when the suspect uses PGP encryption,
often used to increase the security of sent e-mail messages. When activated, the
trojan horse will log the PGP password, which allows the FBI to decrypt user
communications.
Spokesmen for the FBI soon confirmed the existence of a program called Magic
Lantern. They denied that it had been deployed, and they declined to comment
further”
https://en.wikipedia.org/wiki/Magic_Lantern_%28software%29
Then of course we have cell phones which can be activated remotely as well.
“Mobile phone (cell phone) microphones can be activated remotely, without any
need for physical access. This “roving bug” feature has been used by law
enforcement agencies and intelligence services to listen in on nearby
conversations”
https://en.wikipedia.org/wiki/Covert_listening_device#Remotely_activated_mobile_phone_microphones
According to a few of the sources in the Wikipedia article, the cell phone can be activated
to listen to you even when it is off. Pulling the battery will likely do the job, but there is no
guarantee. So make sure the phone is not in the same room as you if you are talking about
anything sensitive. As always, be super paranoid. Turn on the shower and put the phone in
the bathroom if you have to, or better yet if you are going somewhere and you do not need
your cell phone, leave it at home. Since most people never leave home without their cell
phones, if somebody is snooping on you, they might think you are still at home. The first
group of people that went to visit Snowden in Russia were told not to bring any laptops or
cell phones with them for those reasons.
So we know the government is actively trying to gain remote access to your computer,
they can listen to your phones, what should you do about it?
You need to do the best you can to make sure the computers that you use are not exposed
to the elements of risk. Always disable JavaScript when visiting any websites unless the
website is 100% trusted. Start phasing out the use of Microsoft Windows and MAC OSX
because these closed source proprietary operating systems are not open to scrutiny and
auditing the way open source Linux distributions are. There are more Windows users and
thus more exploits available for Windows.
Running your operating system in a Virtual Machine, even if your host OS is Linux
(remember Virtual Box can run on Linux) will help cut down on the retention of any
malware you might pick up when on the internet. Do not go to any potentially harmful
sites on your freedom fighting computers. Do not open any emails from anyone that you
do not trust 100%. Regularly format your hard drives to keep them clean of any hidden
viruses.
If you are unsure if something is safe, test it on a computer only meant for testing and one
that is not connected to the internet. If you can reset your boot sector on your hard drive
from time to time that would be a good idea as well, because you can get master boot
sector viruses that would boot up a virus before your computer even boots into the OS.
Flash your BIOS, the BIOS is the first thing that runs when you turn on your computer, if
you have a virus in your BIOS, there is no antivirus that can remove it, you would need to
flash your BIOS and install a new firmware. Make sure the firmware is 100% trustworthy
as infected firmware is the most common way to get a BIOS virus.
Do'stlaringiz bilan baham: |