clickbait title perhaps, but i’m serious here…
long, long ago, in interweb years, i was put in contact with a LEO who specialized in computer forensics as i recall - at the time i was running Win 9x and i had questions about how it stored data that is hidden from users and how that data can be used by LE
i tried to establish some trust with the guy before i popped the Big Question; can LE access a Windows box remotely without first installing a RAT? answer: “What do you think?” - that’s the last i heard from him
the curious among us have known about the nefarious activities of the “intelligence” communities long before Snowden, but there’s other stuff that i wonder about that is at a deeper level than OSs and the software we use - for example we can monitor net traffic with Wireshark, but might there be other protocols that we don’t know about and which cannot be monitored by a typical packet sniffer?
is it possible to send data over the power lines instead of through the modem? (the answer is ‘yes’, but what i’m asking is whether it’s possible with a typical mainboard without modification)
what dangers are there with proprietary hardware, such as a processor? can backdoors be built in to hardware?
i’d really like to hear from people who have experience with this sort of stuff
- you’re a delusional paranoid tinfoil hat wearing masochist
- you might not be as crazy as you think