/g/ - Technology

install openbsd

[Make a Post]
[X]





White Noise / Counter-Surveillance Technologies Nanonymous No.7818 [D][U][F][S][L][A][C]
File: aa6bd6a883804d9b1ad87d14a30cdfc0d1ac3c31fef750c83706d4a7d9eddd0a.jpg (dl) (71.35 KiB)
I am interested in countering limited targeted surveillance.
A light amount of research on the topic seems to indicate that white noise generators can counter some methods of audio surveillance, but specific details are scarce. Do any nanons know anything useful on this topic?

Nanonymous No.7821 [D]
This sounds like a typical naive solution. Noise makes it harder to do these sorts of attacks, but there are methods to remove noise. The main benefit would be that they require more data in order to mount the attack, so it might be that only some details of what you say escape. But if the attack is mounted over a long time period, then this doesn't seem like a very large benefit. Better then white noise would be to have a device that makes speech-like sounds constantly. AM radio wouldn't work since they could easily remove it. But perhaps a speech synthesis program fed random words, or a bunch of podcast clips played in random order would do. The disadvantage to this method is that it would be more distracting to listen to than white noise. But remember that it will distract spooks even more.

This still isn't a perfect solution, and should be combined with acoustic and electromagnetic insulation to make as little audio escape the room as possible.

Nanonymous No.7824 [D] >>7830 >>7836
What are you trying to protect from? There's many different attacks based on acoustic (crypto)analysis. Or are you protecting only against surveillance?
Against surveillance, a true white noise will provide sound masking and make the audio harder to record. For that, see the PilferShush "active jamming":
https://github.com/kaputnikGo/PilferShushJammer

I don't think digital devices will be effective against a persistent attacker, though. White noise is generated (on digital devices) using PRNG and therefore can be predicted. A stochastic (true random) white noise generator will work better.

You can also use a radio jammer to block the device from sending it using wireless connection:
http://www.ladyada.net/make/wavebubble/index.html

For acoustic (crypto)analysis, those two solutions will probably not be very effective. For example, this software records keyboard sounds (works as a keylogger):
https://github.com/ggerganov/kbd-audio

Or Kscope, that transforms HDD into a "microphone":
https://github.com/ortegaalfredo/kscope

Or even display acoustic side-channel:
https://www.cs.tau.ac.il/~tromer/synesthesia/synesthesia.pdf

Nanonymous No.7826 [D]
what about noise in your internet

Nanonymous No.7830 [D] >>7832
>>7824
>using PRNG and therefore can be predicted.
Even a strong, cryptographically secure PRNG with an uncompromised random seed?

Nanonymous No.7832 [D] >>7836 >>7837 >>7866
>>7830
The thing is: you will repeat the sound multiple times. Contrary to what cryptography does with PRNG (only once). You'll also need to create it in real time and even a good prng (arc4random, for example) will not be able to have enough entropy and might create deterministic numbers. So, if your threat model includes "military specialists", a PRNG will not work. For true RNG in digital devices, see OneRNG, Z1FFER (Open Random) and ChaosKey. Also the research OnChip is doing:
https://nanochanqwrwtmamtnhkfwbbcducc4i62ciss4byo6f3an5qdkhjngid.onion/g/4908.html#post5039

Nanonymous No.7836 [D] >>7839
>>7824
>prng can be predicted
>>7832
>csprng is too slow
To produce random noise at 16 bit 44.1kHz PCM, we need a bitrate of 705,000. If we base our prng off of a hash function that outputs 256 bits, we need to do 7000 hashes per second. This is easy on even 20 year old hardware. Since we only need to mask voice, we don't need to bother with the high ~16kHz of frequency. That drops the necessary bitrate down to 128,000, and the hashrate to 500 hashes per second. The original 8008 could pull that off without a sweat. PRNG can in principle be predicted, but in practice this is the least of our concerns.

Nanonymous No.7837 [D] >>7839
>>7832
>you will repeat the sound multiple times. Contrary to what cryptography does with PRNG (only once).
Could you explain what you mean by this?
>You'll also need to create it in real time and even a good prng (arc4random, for example) will not be able to have enough entropy and might create deterministic numbers.
Are you sure about this? My understanding is that a strong PRNG with 256 bits of security should be able to output a near arbitrary amount of pseudorandom data with a work factor of 2^256 to reverse.

Nanonymous No.7839 [D] >>7862
>>7836
Very nice reply, thanks. Didn't do the math, but you're probably right.
>>7837
>Could you explain what you mean by this?
In cryptography you use random number one time for each binary file you're encrypting. In the case of white noise generation, you'll need to do that in real-time. This means you could (theoretically), apply signal averaging for denoising:
https://en.wikipedia.org/wiki/Signal_averaging

Nanonymous No.7860 [D] >>7864
Leaking RF is likely to be of the most concern. Vibrations and sound likely require some sort of close proximity sensor to read, but that may be more of an issue nowadays due to many consumer tech items providing that opportunity, e.g. cellphones and personal voice assistants.

If you want to have a more secure location, you'll need to have conditioned/filtered power pass-through a grounded metal box. Said metal box would need to not have any windows and have another grounded metal box structure within it. The void area in-between would need to be monitored for RF/auditory leakage.

Something like a modified stamped-metal building with a modified refrigeration trailer unit placed in it, might work ok.
https://en.wikipedia.org/wiki/Tempest_(codename)

Nanonymous No.7862 [D]
>>7839
What do you mean by "you will repeat the sound multiple times"?

Nanonymous No.7864 [D] >>7872
>>7860
Thank you for the response.

Suppose that it is not possible for me to move to a more secure location. Are there any methods of producing RF noise, similar to producing audible noise? Are there any deep sources of information you could point me to?

Nanonymous No.7866 [D]
>not enough entropy
What about that OpenRNG or similar that was talked about in that other /g/ thread?
Could the entropy from one of those not be fed into a white noise generator?

>>7832
>if your threat model includes military
I wonder, do glowers seeking to protect themselves from
the glowers of other govs/orgs come here for knowledge?

Nanonymous No.7872 [D] >>7892
>>7864
No deep sources needed. Look up how to build a spark gap transmitter. In many locations, these are illegal to operate due to the RF interference they cause.

Nanonymous No.7892 [D] >>7962
>>7872
Which would also not be advisable, because it would draw the glowers to you, like moths to a light at night. You'd also have an army of old, curmudgeony HAMs trying to hunt you down.

Nanonymous No.7910 [D]
>What are you trying to protect from?
he doesn't know

Nanonymous No.7962 [D] >>8073
>>7892
Well, sure, but I thought it was interesting that $50 of parts could jam large portions of RF spectrum. Picture spreading these across some city coordinated to spin up at the same time transmitting in primarily GPS, emergency services and cell phone frequencies, and enjoying the lulz. (This post brought to you for entertainment purposes only.)

Nanonymous No.8073 [D][U][F] >>8075 >>8087
File: 59ca4b7d1da62ba47940d56d3a789bd1cb260010de72a0300fccf1a8e7bb7c6d.png (dl) (355.12 KiB)
>>7962
It's the difference between active and passive; one will make you a target, but if your goal is to disrupt, then that's a-ok.

Nanonymous No.8075 [D][U][F] >>8111
File: 9f3ecca894993a293d4bd64e842d8a0312900ccb071554c9d29f4752931cf488.png (dl) (596.84 KiB)
>>8073
Sounds a little defeatist.
Become as best as secure as possible without becoming insecure.

Nanonymous No.8087 [D] >>8111
>>8073
Hook up your jammer into an amplifier and jam a 20km radius around you.
Laugh at the cops who can't find out the origin of the jam because all they see is jam.

Nanonymous No.8111 [D][U][F]
File: 3d360274edff5dc2c32e0bab6be248fa54b49acf30d59cd1426a1ec928cbab62.png (dl) (14.58 KiB)
>>8087

A directional antenna would be able to find the source. You could set up multiple emitters and have them randomly take turns, but even then it would only buy so much time.

>>8075

It's not defeatist, it's a different strategy. It's similar to using a smoke screen vs using camouflage.