From 0e3520f74d25bc43572a1afeaa4439bfedcc0d78 Mon Sep 17 00:00:00 2001
From: Francis Rowe
This tutorial deals with reducing the number of devices that have direct memory access that
could communicate with inputs/outputs that could be used to remotely
- command the machine (or leak data). All of this is purely theoretical for the time being.
+ command the system (or leak data). All of this is purely theoretical for the time being.
Disassembly
@@ -104,7 +104,7 @@
- The following is a summary of what you will remove (already done to this machine):
+ The following is a summary of what you will remove (already done to this system):
Note: the blue lines represent antenna cables and modem cables. You don't need to remove these, but you can if you want
(to make it tidier after removing other parts). I removed the antenna wires, the modem jack, the modem cable and
@@ -119,7 +119,7 @@
record what you say, and use it to receive data from nearby devices if
they're compromised too. Also, we do not know what the built-in microcode (in the CPU) is doing; it could theoretically
be programmed to accept remote commands from some speaker somewhere (remote security hole). In other words,
- the machine could already be compromised from the factory.
+ the system could already be compromised from the factory.
-- cgit v0.9.1