Recent content by kingneil

  1. K

    Has anyone ever shown a phone baseband attack..?

    Has anyone ever shown a phone baseband attack..? Using a fake cell tower, you would send data which takes over the baseband.. and then we know the baseband can control the main phone system. Does anyone actually have any proof of this in the wild...? Other than spies or Feds, I've never seen...
  2. K

    Modify Ethernet/WiFi so only certain marked data packets can be uploaded..?

    I am using Linux. Is it possible to modify Ethernet/WiFi so only certain data packets can be uploaded...? Let's say that a computer gets hacked via web browser, but the WiFi/Ethernet only allows certain data packets to be uploaded. You can't predict what data might get downloaded to your...
  3. K

    Anything else to wipe other than HDD and BIOS..?

    There are some known BIOS attacks. Just Google it.
  4. K

    Anything else to wipe other than HDD and BIOS..?

    If I think a computer has been infected, is there anything else I should wipe/re-install other than 1. Hard Drive / Operating System 2. BIOS Is there anything else that a hacker could possibly infect that needs to be wiped/re-installed..? Thanks
  5. K

    How to dissociate an already-hacked computer from your real identity..?

    No, it can't turn off Tor.. because Tor is set up on a 2nd dedicated computer... i.e the hotspot.
  6. K

    How to dissociate an already-hacked computer from your real identity..?

    The dedicated Tor Ethernet hotspot is not hacked. It's only the laptop behind the Tor router which is hacked.
  7. K

    How to dissociate an already-hacked computer from your real identity..?

    Let's say that you have a computer that is hiding behind a dedicated Tor Ethernet hotspot. So let's assume the computer got hacked by web browser exploit. So it is hacked, but it is still connected via a Tor Ethernet. Therefore, the hacker can see WHAT you are doing, but not WHO you are, i.e...