Amen!
sent from ungoogled-chromium running on Debian 11 on an X230 reflashed with Heads Coreboot
This is actually the reason I ended up here. Was looking for -a- torch, wanted to see if there by any chance was one that had open firmware, ooh look these folk have what they call Andúril… and the rest is history.
Here, from opensource Firefox running on the LineageOS opensource ‘port’ of Android, on my Xiaomi ‘Lisa’ smartphone.
The only thing I don’t have the source code for is Xiaomi’s firmware – were a decent phone available with firmware source available, I would move to it in a jiffy.
And when I need real security (ie, bank stuff, etc) I move to my laptop running Devuan (systemd-free Debian), so even less possible loopholes to be exploited…
LOL! exactly my case
this one’s from Bromite; GrapheneOS, Pixel 7
edited from Firefox, Mobian, Pinephone!
Thanks for the pointer! I’m partial to Firefox since the days it was called Mozilla (right after Netscape opened it up), but options are always good!
Yes… but you need the antenna on both ends… I think. Though a determined hacker with a good enough receiver and antenna may enhance the rage marginally. If we are dealing with the NSA or something, all bets are off. But somebody with a bunch of money that really hates you would be required… AND if that were the case, I am sure they would have better ways of taking you out than “exploding” your batteries…
Now don’t get me wrong, I am probably as paranoid as anyone. I am sure I spend more time and energy on security than most. I was on the IT security team for a large corporation. Way back on a man rated aerospace risk management team. That does not make me an expert, but it did train me how to think about such things. So, I learned a long time ago that I need to balance risk with the amount of time and energy that I put into mitigation. BT on the MC3000 just does not rise to the top of my list of concerns.
Though I do wish they had at least implemented some level of security. Of course if they had… people would be bitching about not being able to connect BT…
Not really: a better antenna on just one end (the hacker’s) will allow him/her to both receive a weaker/more distant signal, and to radiate a stronger/farther-reaching one (technically speaking, a better antenna has higher gain, which enhances both transmitting and receiving at the equipment it’s installed at). OFC if antennas at both ends are upgraded the result is even better, but it’s not a requirement.
Believe me, I just passed my ham exam 2 months ago, so I should know that stuff
Yeah, it’s the old dilemma: more security and piss off the users that can’t (or won’t) figure it out, or less security and piss EVERYONE when (not if) it eventually gets cracked… I worked with internet security for over 2 decades, and I never regretted choosing #1 (but have deeply regretted the very few times I relented and let #2 pass under my watch, or had it forced upon me and didn’t GTFO before the human refuse hit the revolving aparatus).
@Mandrake50, interesting that you worked with that too! Perhaps we can sometime swap war stories about the “good old days”
Congrats on that. What license did you test for? Something I always wanted to do. My brother has an Extra class license. Been doing it for like 50 years. Continually bugs me to get my ticket. For years the code held me back…but no longer an excuse.
As to the BT… at some point the signal is lost in the noise. Pretty much regardless of the receiving gear. Could it be done, sure. I think they still receive signal from the Voyager robots from beyond the Ort Cloud… But is anybody going to setup a 20 foot dish to talk to your Mc3000 ??
It’s a “Radioaficionado categoria aspirante” license, the mandatory initial license here in Chile; the wife took the exam too and was also approved, so we are now both able to use 2m HTs instead of the lousy GRMS/FRS radios we had to use so far. Eventually I plan to get the “Novicio” and “General” licenses to be able to use higher power and other frequency ranges, but for now this is enough.
Yeah, I feel your pain, I hate morse too. But you know, the other day I was scanning the frequencies and there was someone using it, and I really wished I knew it so I could understand what was being said… so perhaps I will go ahead and invest the time to learn it someday. Not just now, I’m still having too much fun with goode olde vox for that
Only if my MC3000 was aboard the Voyager But seriously, just a lousy telescoping antenna would be already enough for a same-city-block “remote battery ignition attack”… What I do is to keep a close eye on my MC3000 and take the batteries out and turn it off as soon as they’re done.
WAAAAY OT, but cool
" UPDATE, Aug. 4, 2023: NASA has reestablished full communications with Voyager 2.
The agency’s Deep Space Network facility in Canberra, Australia, sent the equivalent of an interstellar “shout” more than 12.3 billion miles (19.9 billion kilometers) to Voyager 2, instructing the spacecraft to reorient itself and turn its antenna back to Earth. With a one-way light time of 18.5 hours for the command to reach Voyager, it took 37 hours for mission controllers to learn whether the command worked. At 12:29 a.m. EDT on Aug. 4, the spacecraft began returning science and telemetry data, indicating it is operating normally and that it remains on its expected trajectory."
Maybe make a Faraday cage… only open it while programming it. At least minimizes your exposure…
Of course this is tongue in cheek…
LOL Thanks for the tongue-in-cheek heads-up or I could have believed you were talking seriously
I also got goosebumps when I saw that piece of news. BTW, NASA and the Space Program (even in its current much diminished form) is one of the few things that give me hope for and pride at our otherwise sad and messy species… well, that and participating in great communities like here in BLF, of course
Or the attacker can use a decent enough smartphone and take a walk down the common corridor. I’m able to communicate with 20+ BLE devices just from my flat and if there’s an unsecured serial device I’ll probably try poking around, without trying to sabotage anything, but nonetheless. I’m the kind of person that looks for the hidden maintenance menus in public-facing terminals, be it a fast food order kiosk, a self service cashier, the ID reader in a doctor’s waiting room or anything else. Just out of curiosity. There might be more of me is my point. Not a government backed blackhat in a van with Rohde&Schwarz equipment but a random bored engineer with ADHD who probably means no harm but might cause some anyway
LOL I know exactly what you mean
Turns out there is more.
Could be a security and fire safety 2-for-1 deal though…
Same. Found a vulnerability in a well known piece of software once. A lot of people really have no idea when it comes to radio-based stuff what’s possible, vulnerable devices everywhere. That definitely makes me wary of owning an MC3000 if bluetooth is always on and completely unauthenticated…