Hi, I have been having a look at utilising RF and trying to understand how every device around me emits RF.

I recently came across RTL-SDR and HackRF, alongside software like SDR++, TempestSDR, gqrx etc. I know that I can spy on my monitor and record keyboard keys being pressed using RF, but what are some other ways I should be looking at to exploit my digital vulnerabilities, and trying to solve such problems?

Thanks!


Edit: I’m well aware that nothing I’m doing is that interesting to security agencies across the globe. With that said, I’m interested in maintaining my privacy, and this happens to be an avenue I find interesting. Any suggestions on how I can look to do so would be greatly appreciated!

I don’t think an RTL-SDR is going to help you with any sort of privacy outside of maybe validating that your devices aren’t emitting typical RF while they off. You aren’t realistically going to become an electronic warfare master with some shitty home equipment and no formal training.

Best route is to start combing through security conference presentations for anything relevant to your lifestyle.

A lot of the cutting edge information gathering stuff isn’t exactly practical for widespread use. I guess somebody living a floor above you could capture your wireless traffic, but you’re not interesting enough for them to dedicate high sensitivity antennas and bespoke equipment to phreak your keyboard strokes and break out fucking differential power analysis techniques on your home.

Practice good data and security hygiene, stay off social media when possible, and don’t use IOT devices. If anybody wants to get at you, and I mean really wants to get at you, there’s nothing you’re going to be able to do about it besides giving up all electronics.

Thanks, I realise that I’m an absolute beginner in this, and a cheap dongle isn’t going to make me a guru. I don’t even aim to be one, as such: I just want to know what my devices are emitting, and how easy it is to snoop on and decrypt such signals.

I will have a look at differential power analysis, thanks for mentioning that. I am not very good with electrical engineering concepts, but I’d like to learn as much as I need to.

I know that it is almost impossible to run from the state. With that said, if an average person decides they want to be able to snoop on my activity, I’d like to nip such efforts immediately.

Thanks

I came off as pretty aggressive, so I apologize. I’ve been interested in this field for a while and I am still an amateur in most aspects. This isn’t really an area that’s intuitive or easy to pick up for most people.

You’ve come out of the gate swinging. It’s technically possible for people to do the things you’re exploring… but the same people who are publishing these techniques and concepts are professionals. They may not have formal education in computer science, but they have the experience.

Spend time going over things like DEFCON presentations. Sharpen your coding skills. Vacuum up free courseware from sources like MIT.

You can probably pick up “normal” RF with a cheap SDR antenna setup, but then what? You are stuck with some waves and no idea what to do with them. Are you picking up intentional Bluetooth? How would you recognize Bluetooth that’s frequency hopping? Looking at RF waveforms for modern communications is absolutely ugly and tedious.

There’s so much to learn. You need to pick one topic and dig in. All of these things have much more depth than we can explain over lemmy.

Thank you for the comment. I did start watching DefCon presentations (and would like to visit in person someday!), and have been interested in RF hacking/ hardware hacking for a while now - just didn’t explore it well enough.

Now that you mention it, I do want to pick up Bluetooth and other signals that devices give out. The eventual aim is to be skilled enough to run a personal honeypot and experiment with different protocols.

Thanks, I’ll begin going over some coursework too. Your help is much appreciated!

Honeypots have gotten really weird lately. Anti-honeypot (along with anti-VM and anti-debugging) techniques and methods are more common than ever. I think something like 80% of all APT-level malware from the past 5 years use these techniques

@MigratingtoLemmy@lemmy.world
creator
link
fedilink
2
edit-2
8M

I see. That might not be such a good idea then. Thanks for pointing that out

Create a post

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

  • Posting a link to a website containing tracking isn’t great, if contents of the website are behind a paywall maybe copy them into the post
  • Don’t promote proprietary software
  • Try to keep things on topic
  • If you have a question, please try searching for previous discussions, maybe it has already been answered
  • Reposts are fine, but should have at least a couple of weeks in between so that the post can reach a new audience
  • Be nice :)

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

  • 0 users online
  • 57 users / day
  • 383 users / week
  • 1.5K users / month
  • 5.7K users / 6 months
  • 1 subscriber
  • 2.43K Posts
  • 57.3K Comments
  • Modlog