aeris22’s avataraeris22’s Twitter Archive—№ 96,837

          1. …in reply to @cyberflamingo
            @cyberflamingo @stmanfr @Snowden @SecureDrop Honnestly, no consideration at all… I will explain why.
        1. …in reply to @aeris22
          @cyberflamingo @stmanfr @Snowden @SecureDrop In theory, such hardware identification via serial number is possible. But in practice not. For example collecting SN of the mother is possible, and sending such number on hidden channel on TCP flux too. But both in same time are unlikely.
      1. …in reply to @aeris22
        @cyberflamingo @stmanfr @Snowden @SecureDrop And to do that, it requires software or something like that to collect & carry the shit. @stmanfr supposed here there is backdoor everywhere in every hardware piece designed specially for this task… This is unlikely the case in practice.
    1. …in reply to @aeris22
      @cyberflamingo @stmanfr @Snowden @SecureDrop A complement on this topic. Carrying SN on hidden hardware field is hard. Very hard. On IP or ethernet for example, you have only few bits to carry saying a 48 bits mac address. We are speaking about correlation over 10ish IP packets by a ubiquitous adversary, spread over […]
  1. …in reply to @aeris22
    @cyberflamingo @stmanfr @Snowden @SecureDrop multiple different routes because of TCP fragmentation and routing troubles. We are speaking about problem of pass through active or passive hardware components on the network (switch, router, firewall, ISP backbone…) with each hop able to wipe the hidden SN if the […]
    1. …in reply to @aeris22
      @cyberflamingo @stmanfr @Snowden @SecureDrop carrying of those useless bits are not done internaly on such intermediate nodes. Or difficulties to decide if you want to propagate the already present hidden SN on a frame or to remplace it with the SN of the node in front of you to track it.
      1. …in reply to @aeris22
        @cyberflamingo @stmanfr @Snowden @SecureDrop We ask for decades for a paper or explaination from @stmanfr about how to achieve some complex behavior/decision/correllation without falling on his constant and persistant conspiracy theory "but they can do this because all hardware are backdoored with the behavior they want".
        1. …in reply to @aeris22
          @cyberflamingo @stmanfr @Snowden @SecureDrop In practice such behavior are likely impossible to achieve, any intermediate equipment will wipe any hidden data on useless fields.