[cryptome] Re: what-does-gchq-know-about-our-devices-that-we-dont

  • From: Shaun O'Connor <capricorn8159@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Sat, 05 Jul 2014 02:51:24 +0100

I have seen this article previously, my guess is that the components
identified take the raw data from user activity before it reaches any
part of the computer that can modify it. redirects it and sends it on
its merry way for analysis then allowing the data to be handled
normally. the added latency would be so slight that, without
sophisticated timing tests, it would be all but impossible to detect in
a day to day situation.
So Question, what can be gleaned from such raw data? quite a lot!
for example, in a track pad. the data stream recorded can be used to
correlate finger movements.
additionally keyboard activity can be analyzed to discern the users
average typing speed. intervals between entry of blocks of data.
corrective action when entering information.and so forth. the
component(s) linked with the monitor will provide a bit pattern
correlating with the user interface of any software being used on the
In effect. it is the electronic equivalent of having someone standing
over your shoulder watching every keystroke and hand movement and seeing
things in real time as you write your biog, your article, whatever you
are doing at the computer at that time.

OF course I do not have the specifications of the destroyed hardware but
the very nature of the components destroyed and their placement is very
suggestive of the scenario I have just outlined.
I do not consider myself to be an expert on computer systems by any
means so anyone who sees any errors in my analysis feel free to chip in.

On 05/07/2014 02:13, In Harms Way wrote:
> https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont


Other related posts: