[Cryptography] Data exfiltration from attached peripherals

Henry Baker hbaker1 at pipeline.com
Thu Aug 29 11:18:22 EDT 2024


-----Original Message-----
From: Ray Dillinger <bear at sonic.net>
Sent: Aug 28, 2024 12:23 PM
To: Cryptography Mailing List <cryptography at metzdowd.com>
Subject: [Cryptography] Data exfiltration from attached peripherals


Assume the existence of a dishonest IoT device manufacturer who is going all in on the "surveillance economy."  Yeah, I know, trivial assumption. We don't have to assume.

They manufacture a smart TV with voice-activated features, putting a microphone in the owners' living rooms.

In the usual case, the TV is installed with its own IP address and network capabilities, and they can get audio recordings of family arguments, private conversations about family finances, and lovemaking sessions delivered to their servers automatically. Along with content monitoring so they know what programming they're playing or reacting to.  Depending on who the owner is, this is likely to be a lucrative data stream.

But now consider the case where someone buys the "smart TV," hooks it up to an HDMI cable, and uses it for a computer monitor. It doesn't have its own IP address.  Conversely, content monitoring (screen grabs) can now have devastating privacy implications since they reveal what someone is working on, financial spreadsheets, proprietary code, etc etc etc...

Does that TV have any way to exfiltrate that data in the context of what network services it can get from a computer configured to treat it as a monitor?

Same question for a printer, connected as a USB peripheral and NOT given its own IP address.  Are computer OS's these days so eager to put any connected printer on whatever network the computer is attached to, that the printer actually can request and get the ability to send packets to the wide internet even if it's not configured to be a network printer?

How about Mice, Keyboards, and USB/wireless peripherals in general? What network privileges can these devices obtain without too much trouble if malign supply-chain crooks want to exfiltrate data and can get someone to attach them to the computer?

Bear

------------

"Smart" TV's are *already* watching you watch TV, even if only as a TV "monitor".

It's trivial to sample the HDMI data to find out what channel you're watching,
what streaming service you're watching, what OS (Android/FireTV/...) you're
using.

If you have one of those "smart" LED displays that globally changes the overall
brightness to match the ambient room conditions, someone can sample just this
brightness level and still get most of the information.  Furthermore, since
the TV is measuring the surrounding light level, it can also spy on non-TV
content to some extent.

Of course, based upon your ratio of Fox v MSNBC, the spooks can probably tell who
you vote for.

If you turn on subtitles, it's even easier.

If you have a "smart" remote with voice capabilities, it's really pretty much
game over.

Note that a "real" microphone isn't necessary: only the ability to detect
vibration within a chip; if there's a piece of metal small enough to respond
to the frequencies of interest, its vibrations might be detectable.

---
About 20 years ago, I was trying to think about how one could reduce the level
of spying, and was trying to think about what sort of display could take
advantage of the human visual system so that a *human* watching a program
could synthesize the correct picture, but -- e.g., a video camera -- would
get only garbage.  There might be some techniques involving faking out the
uniform sampling rate of video equipment vs the eye's ability to utilize
non-uniform sampling rates. Think some sort of spread spectrum technique.

But I didn't know any visual psychologists to consult with, so I didn't come
to any hard conclusions.

---
Re exfiltration:

There are long distance spread spectrum techniques that are *extremely effective*,
and take *very little RF power*. This is how NASA talks to interstellar probes
that have gone past the planet Pluto.

If you're willing to reduce the exfiltration bit rate, the power can be reduced
almost arbitrarily.

I'm aware of some water/gas *meter reading* systems that are battery-powered,
work *below ground*, whose battery can last *ten years*.  These systems have
an effective range of a small city.

If someone has your home under observation -- e.g., using a long distance telescope,
an LED TV can adjust its brightness levels very quickly (and imperceptibly to the
human eye) in such a way as to get quite decent bit rates (at least audio quality).
This is how "LiFi" works.  With line-of-sight, it should be possible to transmit this
information 20 miles or more (i.e., within sight of a loitering drone).

This is why "smart LED bulbs" may also be worse idea ever invented: they can make
absurdly cheap "bugs", once they have a microphone and the right software.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20240829/4df5e694/attachment.htm>


More information about the cryptography mailing list