[Cryptography] Data exfiltration from attached peripherals

Ray Dillinger bear at sonic.net
Wed Aug 28 14:21:58 EDT 2024


Assume the existence of a dishonest IoT device manufacturer who is going 
all in on the "surveillance economy."  Yeah, I know, trivial assumption. 
We don't have to assume.

They manufacture a smart TV with voice-activated features, putting a 
microphone in the owners' living rooms.

In the usual case, the TV is installed with its own IP address and 
network capabilities, and they can get audio recordings of family 
arguments, private conversations about family finances, and lovemaking 
sessions delivered to their servers automatically. Along with content 
monitoring so they know what programming they're playing or reacting 
to.  Depending on who the owner is, this is likely to be a lucrative 
data stream.

But now consider the case where someone buys the "smart TV," hooks it up 
to an HDMI cable, and uses it for a computer monitor. It doesn't have 
its own IP address.  Conversely, content monitoring (screen grabs) can 
now have devastating privacy implications since they reveal what someone 
is working on, financial spreadsheets, proprietary code, etc etc etc...

Does that TV have any way to exfiltrate that data in the context of what 
network services it can get from a computer configured to treat it as a 
monitor?

Same question for a printer, connected as a USB peripheral and NOT given 
its own IP address.  Are computer OS's these days so eager to put any 
connected printer on whatever network the computer is attached to, that 
the printer actually can request and get the ability to send packets to 
the wide internet even if it's not configured to be a network printer?

How about Mice, Keyboards, and USB/wireless peripherals in general? What 
network privileges can these devices obtain without too much trouble if 
malign supply-chain crooks want to exfiltrate data and can get someone 
to attach them to the computer?

Bear





More information about the cryptography mailing list