their security According to Mordechai Guri, head of the cybersecurity laboratory at Ben-Gurion University, the insidiousness of this method is that most users have never thought about this possibility of using headphones. Therefore, even those who tape over the cameras on their devices and remove the microphones are not immune to this type of wiretapping.
Guri said there is no software patch their security
Fix the vulnerability of Realtek country email list audio chips. At the moment, the bug has only been test on computers with Realtek chips, but it is possible that other devices may be susceptible to such an attack. should remember to turn off headphones when not in use. In addition, to protect themselves from malicious use of RealTek audio chips, it is worth paying attention to what files the user runs and with what rights he does so.
Tor developers have creat a prototype of a secure smartphone
IncreaseCopperhead OS is currently only available on the Nexus 5X, Pixel, and Pixel XL
Copperhead OS is currently only available on the Nexus 5X, Pixel, and Pixel XL
Mike Perry, one of the leading developers of the anonymous
Tor network, present a prototype of the secure smartphone Mission Improbable, writes Android Authority. The device’s software is bas on Copperhead OS and the OrWall firewall, which routes traffic through the Tor network and blocks any other traffic. OrWall also allows the user to decide which applications’ traffic to route through Tor and which to route through the usual route. The firewall can route voice traffic in such a way as to hide the device’s IP address using Tor.
The creators of Mission
Improbable note that the however not every search engine supports smartphone is design for advanc users who want to aero leads remain anonymous online. Ordinary users will find it difficult to use the device, as they will ne knowlge of Linux. According to Perry, only smartphones of the Nexus and Pixel lines are suitable for working with Copperhead OS – these are the only Android devices that allow you to install your own keys, while retaining the ability to modify the smartphone and a secure file system.