Page 2 of 4 FirstFirst 1234 LastLast
Results 16 to 30 of 51

Thread: Android smart TV

  1. #16
    Join Date
    6th May 2012 - 10:41
    Bike
    invisibike
    Location
    pulling a sick mono
    Posts
    6,054
    Blog Entries
    4
    Quote Originally Posted by pzkpfw View Post
    ).

    Secondly, the software the spooks have needs to infect the T.V. via USB. That is, the "spy" had to get to first get physical access to your T.V.
    r u fukn srs??
    no, they don't. the firmware will have back doors built in. (for ota upgrades, for your convinience) which will also allow hardware streams to go straight out. a lá intel, nvidia chips and uefi. not to mention the "apps" you give permissions to without thinking about it.

    a speaker is a microphone when wired so.

    the snooping is entirely possible, even probable. but is it profitable?
    que bono cunt, que bono.

  2. #17
    Join Date
    1st November 2005 - 08:18
    Bike
    F-117.
    Location
    Banana Republic of NZ
    Posts
    7,048
    Quote Originally Posted by pete376403 View Post
    CIA will be watching and hearing everything you do (apparently). Bedroom set you say...
    Hopefully they appreciate comedy shows...
    TOP QUOTE: “The problem with socialism is that sooner or later you run out of other people’s money.”

  3. #18
    Join Date
    25th March 2004 - 17:22
    Bike
    RZ496/Street 765RS/GasGas/ etc etc
    Location
    Wellington. . ok the hutt
    Posts
    21,268
    Blog Entries
    2
    Meh, I'll wipe a bit of semen on the camera lens.
    Don't you look at my accountant.
    He's the only one I've got.

  4. #19
    Join Date
    17th June 2010 - 16:44
    Bike
    bandit
    Location
    Bay of Plenty
    Posts
    2,885
    Quote Originally Posted by pzkpfw View Post
    Given the font size, are you serious? (Can't tell if that's the sarcasm font. Just in case ...).

    Firstly, not all smart T.V.s have cameras, or microphones. (And even then, nothing's new. Samsung got bollocked a year or two back when a voice-command model of T.V. was found to be sending "heard stuff" back to the voice recognition company for training their software).

    Secondly, the software the spooks have needs to infect the T.V. via USB. That is, the "spy" had to get to first get physical access to your T.V.

    As I understand it (and I'm not a nerd - more of a Luddite) as soon as you plug in your computer it can al be hacked ...
    "So if you meet me, have some sympathy, have some courtesy, have some taste ..."

  5. #20
    Join Date
    31st March 2005 - 02:18
    Bike
    CB919, 1090R, R1200GSA
    Location
    East Aucks
    Posts
    10,498
    Blog Entries
    140
    Quote Originally Posted by Banditbandit View Post
    As I understand it (and I'm not a nerd - more of a Luddite) as soon as you plug in your computer it can al be hacked ...
    You probably don't want to read this but...

    Unless you have uPnP enabled that allows a device to establish a connection out (and more importantly and riskily, in), or allow it to receive DHCP or manually configure an Internet connection with associated DNS/Gateway, no, it can't just magically do whatever it likes... however, it does depend on the person using the technology and how much they understand.

    It's very easy to lock down the device, but naturally, the more secure you make it, the less functional it is.
    Quote Originally Posted by Jane Omorogbe from UK MSN on the KTM990SM
    It's barking mad and if it doesn't turn you into a complete loon within half an hour of cocking a leg over the lofty 875mm seat height, I'll eat my Arai.

  6. #21
    Join Date
    9th November 2005 - 18:45
    Bike
    2005 Z750S
    Location
    Wellington
    Posts
    1,136
    Quote Originally Posted by Banditbandit View Post
    As I understand it (and I'm not a nerd - more of a Luddite) as soon as you plug in your computer it can al be hacked ...
    Even if this is assumed (Gremlin puts that in some perspective), my comment was a reply to comments that seemed based on the recently leaked (Wikileaks) information that included use of T.V.'s for spying.

    ... and one of the aspects of that leaked information, was the need for physical access to the T.V. for "infection".
    Measure once, cut twice. Practice makes perfect.

  7. #22
    Join Date
    3rd February 2004 - 08:11
    Bike
    2021 Street Triple RS, 2008 KLR650
    Location
    Wallaceville, Upper hutt
    Posts
    5,232
    Blog Entries
    5
    Most of the Internet of Things devices appear to ship with minimal-to-none security, to make them super easy to setup (plug and play, hey?) Default userids and passwords (admin/admin)if at all. Buried somewhere in the setup instructions it says to change the password to something more secure but who reads instructions?
    it's not a bad thing till you throw a KLR into the mix.
    those cheap ass bitches can do anything with ductape.
    (PostalDave on ADVrider)

  8. #23
    Join Date
    9th November 2005 - 18:45
    Bike
    2005 Z750S
    Location
    Wellington
    Posts
    1,136
    Quote Originally Posted by pete376403 View Post
    Most of the Internet of Things devices appear to ship with minimal-to-none security, to make them super easy to setup (plug and play, hey?) Default userids and passwords (admin/admin)if at all. Buried somewhere in the setup instructions it says to change the password to something more secure but who reads instructions?
    Yeah, those sort of things are the worst. They're designed to splurg out information, and they don't secure it well. Internet connected baby-monitors and security cameras are often found to be easy to get a feed from.

    It's easy enough to write software to trawl known ports on lists of ip address, looking for known devices with known flaws. There's even an open website (I forget the name of right now) that lists them.

    The script kiddies have fun making random people's printers spit out pages that say "secure your device" (with more words).


    Randomish links:
    http://www.computerworld.com/article...to-attack.html
    https://motherboard.vice.com/en_us/a...k-the-internet
    Measure once, cut twice. Practice makes perfect.

  9. #24
    Join Date
    31st March 2005 - 02:18
    Bike
    CB919, 1090R, R1200GSA
    Location
    East Aucks
    Posts
    10,498
    Blog Entries
    140
    How about open wireless in a lawyers house? Told my client to talk to their neighbour...

    One client bought a novelty security camera (without telling me), oh, so easy and I can connect to it when I'm out and about.... yeeeeaaaah, so if you can connect from anywhere, what about others?

    Security is like backups... many only realise the value when it's too late
    Quote Originally Posted by Jane Omorogbe from UK MSN on the KTM990SM
    It's barking mad and if it doesn't turn you into a complete loon within half an hour of cocking a leg over the lofty 875mm seat height, I'll eat my Arai.

  10. #25
    Join Date
    25th March 2004 - 17:22
    Bike
    RZ496/Street 765RS/GasGas/ etc etc
    Location
    Wellington. . ok the hutt
    Posts
    21,268
    Blog Entries
    2
    Well you've convinced me.

    I'm going to buy a smart TV and dance in front of it naked. That should put off any further surveillance.
    Don't you look at my accountant.
    He's the only one I've got.

  11. #26
    Join Date
    6th May 2012 - 10:41
    Bike
    invisibike
    Location
    pulling a sick mono
    Posts
    6,054
    Blog Entries
    4
    Quote Originally Posted by pzkpfw View Post

    ... and one of the aspects of that leaked information, was the need for physical access to the T.V. for "infection".
    you get your idiot box straight off the production line do ya? and scrutineer the microcode?

  12. #27
    Join Date
    6th May 2012 - 10:41
    Bike
    invisibike
    Location
    pulling a sick mono
    Posts
    6,054
    Blog Entries
    4
    Quote Originally Posted by pete376403 View Post
    who reads instructions?
    most people who don't run windows.

  13. #28
    Join Date
    16th February 2009 - 21:24
    Bike
    2012 Yamaha WR 450. 2014 Beta 300RR 2t.
    Location
    Christchurch
    Posts
    782
    Quote Originally Posted by F5 Dave View Post
    Well you've convinced me.

    I'm going to buy a smart TV and dance in front of it naked. That should put off any further surveillance.
    Consider LG smart tv. A mate has one and they have the RED BULL TV app, only one that does apparently, watch hard enduro, erzberg, romainiac's etc. It's what I want one day.
    flashg

  14. #29
    Join Date
    25th June 2012 - 11:56
    Bike
    Daelim VL250 Daystar
    Location
    Pyongyang
    Posts
    2,655
    "New Intel based PC's PERMANENTLY hackable
    So you think no one can access your data because your computer is turned off. Heck it's more than turned off, you even took the main hard drive out, and only the backup disk is inside. There is no operating system installed at all. So you KNOW you are safe.

    Frank from across the street is an alternative operating systems hobbyist, and he has tons of computers. He has Free BSD on a couple, his own compilation of Linux on another, a Mac for the wife, and even has Solaris on yet another. Frank knows systems security, so he cannot be hacked . . . . . . . or so he thinks.

    The government does not like Frank much, because they LOVE to look at everything. Privacy is a crime don't you know, and it looks like Frank's luck with privacy is about to run out.

    The new Intel Core vPro processors contain a new remote access feature which allows 100 percent remote acess to a PC 100 percent of the time, even if the computer is TURNED OFF. Core vPro processors contain a second physical processor embedded within the main processor which has it's own operating system embedded on the chip itself. As long as the power supply is available and and in working condition, it can be woken up by the Core vPro processor, which runs on the system's phantom power and is able to quietly turn individual hardware components on and access anything on them.

    This is being touted as something that makes IT administration easy. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC no matter what is wrong with it. It allows IT professionals to view the contents of hard drives, check the memory, or hunt for problems on a machine without actually being in front of it. And to that, I call B.S, - outside of snooping it's only real world applications would involve accessing a recovery partiton and restoring the computer to out of box state, installing software outside the knowledge of the main operating system, and secretly placing or deleting files.

    But the intelligence agencies LOVE THIS. Because Frank is going on vacation soon and they know it. They have listened to all of his calls. They KNOW frank is a terrorist, because they have never been able to access anything Frank has done with a PC, and who would hide their use, other than a criminal? Frank keeps his computers up to date, and JUST BOUGHT THREE of them which have Core vPro processors in them, and when Frank is gone, they are going to get their chance to access ALL of his files because the main backup hard disk went into the newest machine.



    Real world intelligence agency use for Core vPro processors will involve the following:
    Accessing any PC ANYWHERE, no matter what operating system is installed, even if it is physically disconnected from the internet. You see, Core vPro processors work in conjunction with Intel's new Anti Theft 3.0, which put 3g connectivity into every Intel CPU after the Sandy Bridge version of the I3/5/7 processors. Users do not get to know about that 3g connection, but it IS there.

    Frank was not stupid so he unplugged his router. Unfortunately for Frank, that won't work, because anti theft 3.0 always has that 3g connection on also, even if the computer is turned off.

    Sorry frank, you were good with operating systems, but did not know EVERYTHING about hardware. And now the real reason for your finicky security habits will be known to the NSA - you found a way to route photons to any place in the world without any sort of cable. You revolutionized communications. You were going public when you returned from your vacation, but thanks to your new Core vPro processors, a major communications firm is going to go public with your invention BEFORE you get home, and your research will be deleted and replaced with "criminal activity" so you will be arrested when you get back and unable to speak about the theft of your invention. Fascism is GREAT.



    CoreVpro is a PERFECT hack
    If a system has the ram chips pulled, a Core vPro processor will read the hard disk anyway because it has all the ram it needs embedded in the vPro core.

    If you encrypted your hard drive, a Core vPro processor will read it anyway, because it snagged your encryption key

    If your system has been taken apart, and has no video card, ram, floppy, or hard drive, your Core vPro processor nailed you, because you left a flash drive plugged in. Or a CD in the CD drive. And what about that web cam?

    The bottom line? The Core vPro processor is the end of any pretend privacy. If you think encryption, Norton, or anything else is going to ensure your privacy, including never hooking up to the web AT ALL, think again. There is now more than just a ghost in the machine.

    "
    Every great cause begins as a movement, becomes a business, and eventually degenerates into a racket - Eric Hoffer

  15. #30
    Join Date
    25th March 2004 - 17:22
    Bike
    RZ496/Street 765RS/GasGas/ etc etc
    Location
    Wellington. . ok the hutt
    Posts
    21,268
    Blog Entries
    2
    I can get red bull on the Kodiak box.

    Looks like Sony might be the go.
    Don't you look at my accountant.
    He's the only one I've got.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •