Results 1 to 23 of 23

Thread: TV hack?

  1. #1
    RoadBikeReview Member
    Reputation:
    Join Date
    Oct 2013
    Posts
    1,832

    TV hack?

    "Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

    So, when my TV gets hacked, what does that mean?
    They are watch the same porn as me?
    BANNED

  2. #2
    RoadBikeReview Member
    Reputation:
    Join Date
    Feb 2012
    Posts
    1,087
    Tell them it's for educational purposes only...

  3. #3
    Quiet, daddy's drinking
    Reputation: Turtleherder's Avatar
    Join Date
    Feb 2004
    Posts
    5,608
    Quote Originally Posted by duriel View Post
    "Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

    So, when my TV gets hacked, what does that mean?
    They are watch the same porn as me?
    Some Samsung tv's have voice command. A hack can turn this into a microphone so that anyone outside can listen into what is happening in the room. This of course would not apply to your average idjit but could be useful in select governmental meeting rooms, hotel rooms, etc.
    Just because you won't listen to reason does not mean I have to listen to idiocy.

    No collusion with the delusion

    “Nationalism always breaks its promises because nationalists hate enemies in their countries more than they hate the enemies of their countries" The Guardian.

  4. #4
    Fake President
    Reputation: SystemShock's Avatar
    Join Date
    Jun 2008
    Posts
    30,294
    Quote Originally Posted by Turtleherder View Post
    Some Samsung tv's have voice command. A hack can turn this into a microphone so that anyone outside can listen into what is happening in the room. This of course would not apply to your average idjit but could be useful in select governmental meeting rooms, hotel rooms, etc.
    And of course, they can do the same thing to your smartphone too.
    System: Fake news?? Trump is a Fake President™, for god's sake.

    Monk: I want to go like my Dad did – peacefully, in his sleep, not screaming in terror like his passengers.

    Plat: I'd rather fellate a syphilitic goat than own a Cervelo.

    EJ Dionne: Modern-day conservatism isn't conservatism. It's reaction rooted in deep pessimism that isn't in keeping with the American character.

    Seam: Saw Bjork poop onstage back in the day. It blew my teenage mind.


  5. #5
    ( ͡° ͜ʖ ͡°)
    Reputation: old_fuji's Avatar
    Join Date
    Mar 2009
    Posts
    6,034
    In related news:
    How IoT hackers turned a university's network against itself | ZDNet

    Every appliance you have that's connected to the internet can generate traffic...That's your "smart" TV, furnace, door locks, thermostat, toothbrush, etc. If all of your devices suddenly activate on your personal network, that amount of traffic can cripple whatever it is you're trying to do (Post on RBR, watch Netflix, whatever.)
    I lost my phone number. Can I have yours?

  6. #6
    gazing from the shadows
    Reputation: QuiQuaeQuod's Avatar
    Join Date
    Jan 2003
    Posts
    24,854
    Quote Originally Posted by Turtleherder View Post
    Some Samsung tv's have voice command. A hack can turn this into a microphone so that anyone outside can listen into what is happening in the room. This of course would not apply to your average idjit but could be useful in select governmental meeting rooms, hotel rooms, etc.

    That is a specific example.

    In general, once you have the TV you are inside of the (home or business) network, and all sorts of things are easier to do then.
    .
    Stout beers under trees, please.

  7. #7
    tlg
    tlg is offline
    RoadBikeReview Member
    Reputation: tlg's Avatar
    Join Date
    May 2011
    Posts
    9,291
    Quote Originally Posted by duriel View Post
    So, when my TV gets hacked, what does that mean?
    They are watch the same porn as me?[/B][/FONT][/COLOR]
    Depending on what TV you have, they could watch you "watching" porn.

    Samsung 9000 Series Smart TV with Built-In Webcam
    Custom Di2 & Garmin/GoPro mounts 2013 SuperSix EVO Hi-MOD Team * 2004 Klein Aura V

  8. #8
    Self-imposed PO exile
    Reputation:
    Join Date
    Oct 2009
    Posts
    6,176
    Quote Originally Posted by duriel View Post
    "Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

    So, when my TV gets hacked, what does that mean?
    They are watch the same porn as me?
    I read through some of the articles, and I guess they were able to create a "Fake-off" command, so your TV looked like it was off, but the voice command mic was still on and they were able to listen in.


    Now there's a crowd I don't want to pick a fight with.

    Geessshhhh

  9. #9
    Opus was just napping
    Reputation: thatsmybush's Avatar
    Join Date
    Mar 2002
    Posts
    17,307
    Quote Originally Posted by old_fuji View Post
    In related news:
    How IoT hackers turned a university's network against itself | ZDNet

    Every appliance you have that's connected to the internet can generate traffic...That's your "smart" TV, furnace, door locks, thermostat, toothbrush, etc. If all of your devices suddenly activate on your personal network, that amount of traffic can cripple whatever it is you're trying to do (Post on RBR, watch Netflix, whatever.)
    In the time of battle you don't rise to the occasion you resort to the level of your conditioning...

  10. #10
    banned
    Reputation:
    Join Date
    Feb 2017
    Posts
    23
    Quote Originally Posted by old_fuji View Post
    In related news:
    How IoT hackers turned a university's network against itself | ZDNet

    Every appliance you have that's connected to the internet can generate traffic...That's your "smart" TV, furnace, door locks, thermostat, toothbrush, etc. If all of your devices suddenly activate on your personal network, that amount of traffic can cripple whatever it is you're trying to do (Post on RBR, watch Netflix, whatever.)
    All the more reasons to not have all that crap in your house. I don't see a need for a T-Stat to be on the internet.

  11. #11
    RoadBikeReview Member
    Reputation:
    Join Date
    Apr 2010
    Posts
    4,988
    Quote Originally Posted by SystemShock View Post
    And of course, they can do the same thing to your smartphone too.
    I took a pen and jabbed it into my mic on my phone.

    I then painted over both camera lenses.

    The speaker sucked anyway

    So, I speak no evil, see no evil, or hear no evil
    It's a fire road.............
    I'm on a road bike..........

    They have enough in common to blast down it.

  12. #12
    RoadBikeReview Member
    Reputation:
    Join Date
    Oct 2013
    Posts
    1,832
    Quote Originally Posted by ziscwg View Post
    I took a pen and jabbed it into my mic on my phone.
    I guess you only text? and send r-rated photo's, of course.
    BANNED

  13. #13
    RoadBikeReview Member
    Reputation: 9W9W's Avatar
    Join Date
    Apr 2012
    Posts
    2,275
    Quote Originally Posted by duriel View Post
    "Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

    So, when my TV gets hacked, what does that mean?
    They are watch the same porn as me?
    You watch porn on your television???

    Does not compute.
    "That pretty much sums it up. I'm 43 and my max is ~178-180. If that HR chart was mine or Froome's, we'd be on the verge of death. But for you it probably looks like a normal workout." -TLG

    LOLOLOL

  14. #14
    RoadBikeReview Member
    Reputation: Christine's Avatar
    Join Date
    Jul 2005
    Posts
    14,630
    Quote Originally Posted by 9W9W View Post
    You watch porn on your television???

    Does not compute.
    This is RBR. He's got quite the VHS collection

  15. #15
    RoadBikeReview Member
    Reputation: 9W9W's Avatar
    Join Date
    Apr 2012
    Posts
    2,275
    Quote Originally Posted by Christine View Post
    This is RBR. He's got quite the VHS collection

    Ahhh of course... spoken like someone who has seven years of RBR membership over me. Evidently you've seen things!
    "That pretty much sums it up. I'm 43 and my max is ~178-180. If that HR chart was mine or Froome's, we'd be on the verge of death. But for you it probably looks like a normal workout." -TLG

    LOLOLOL

  16. #16
    Custom Title= ?
    Reputation: Bixe's Avatar
    Join Date
    Jan 2004
    Posts
    760
    If they hack the TV, they will have to fix it first.
    Qh6+!!

  17. #17
    RoadBikeReview Member
    Reputation:
    Join Date
    Oct 2014
    Posts
    2,037
    It's my understanding that the TV hack required a physical USB dongle plugged into the back of the TV, and a custom firwmware be loaded. It would simulate the TV being powered off by disabling the LED's and any other indications it was on, but it would still be recording audio. The audio could not be transmitted. I could only be saved locally on the USB dongle and retrieved manually later.

    Bottom line, don't let strangers come into your house and plus USB dongles into the back of your TV and you should be fine.

  18. #18
    gazing from the shadows
    Reputation: QuiQuaeQuod's Avatar
    Join Date
    Jan 2003
    Posts
    24,854
    Quote Originally Posted by Migen21 View Post
    It's my understanding that the TV hack required a physical USB dongle plugged into the back of the TV, and a custom firwmware be loaded. It would simulate the TV being powered off by disabling the LED's and any other indications it was on, but it would still be recording audio. The audio could not be transmitted. I could only be saved locally on the USB dongle and retrieved manually later.

    Bottom line, don't let strangers come into your house and plus USB dongles into the back of your TV and you should be fine.
    Your understanding of what a single version of some code does might be correct, but it doesn't mean what you think it means. You clearly don't think like a hacker, or a spy.

    The dongle application would make sense for places like hotel rooms for a spy. Compromise the cleaning staff (or just get a master swipe card), and own any room at any time without exposure of higher level assets, and without providing IPs to backtrack if the dongle is discovered. That's the reason for recording to the dongle, to keep the trail cold if the hack is discovered. And most people won't discover it. Load some sexy videos on it, and people will just think it was left behind. The hack goes in a hidden partition, or at least a hidden folder. So even if found, it won't trigger worries except among the highly paranoid. Who would look for a trail, but not be able to find one.

    Any hackers know that one version of an exploit can be altered quickly, and combined with other exploits to get the job done. There have been many stories of smart TVs being hacked remotely by using the default passwords from the factory. Any exploit that can record to a dongle can be changed to send that information elsewhere, such a change is trivial. I am sure you get the point.
    .
    Stout beers under trees, please.

  19. #19
    Banned forever.....or not
    Reputation: MR_GRUMPY's Avatar
    Join Date
    Aug 2002
    Posts
    23,660
    I have some magic beans if you are interested.
    If your opinion differs from mine, ..........Too bad.
    .
    How would you like it if Hitler killed you
    Dogbert.

    I>U

    Buying parts to hang on your bike is always easier than getting fit.

    If you feel wimpy and weak, get out and train more, ya wee lassie!

    If Jesus had a gun, he'd be alive today!

  20. #20
    RoadBikeReview Member
    Reputation:
    Join Date
    Feb 2004
    Posts
    4,023
    Quote Originally Posted by duriel View Post
    "Wikileaks has published details of what it says are wide-ranging hacking tools used by the CIA. The alleged cyber-weapons are said to include malware that targets Windows, Android, iOS, OSX and Linux computers as well as internet routers. Some of the software is reported to have been developed in-house, but the UK's MI5 agency is said to have helped build a spyware attack for Samsung TVs."

    So, when my TV gets hacked, what does that mean?
    They are watch the same porn as me?
    This is scary stuff, but I fear this less that all the information being collected on us by Google, Amazon, etc. Unless you are ready to go off the grid and hole up in a bunker in Idaho, there is not much you can do

  21. #21
    RoadBikeReview Member
    Reputation:
    Join Date
    Oct 2013
    Posts
    1,832
    My bunker is in AZ, but don't tell anyone!
    BANNED

  22. #22
    RoadBikeReview Member
    Reputation:
    Join Date
    Oct 2014
    Posts
    2,037
    Quote Originally Posted by QuiQuaeQuod View Post
    Your understanding of what a single version of some code does might be correct, but it doesn't mean what you think it means. You clearly don't think like a hacker, or a spy.

    The dongle application would make sense for places like hotel rooms for a spy. Compromise the cleaning staff (or just get a master swipe card), and own any room at any time without exposure of higher level assets, and without providing IPs to backtrack if the dongle is discovered. That's the reason for recording to the dongle, to keep the trail cold if the hack is discovered. And most people won't discover it. Load some sexy videos on it, and people will just think it was left behind. The hack goes in a hidden partition, or at least a hidden folder. So even if found, it won't trigger worries except among the highly paranoid. Who would look for a trail, but not be able to find one.

    Any hackers know that one version of an exploit can be altered quickly, and combined with other exploits to get the job done. There have been many stories of smart TVs being hacked remotely by using the default passwords from the factory. Any exploit that can record to a dongle can be changed to send that information elsewhere, such a change is trivial. I am sure you get the point.
    You clearly missed the fact that I wrote my post using the 'snark' font - please go back and re-read.

  23. #23
    gazing from the shadows
    Reputation: QuiQuaeQuod's Avatar
    Join Date
    Jan 2003
    Posts
    24,854
    Quote Originally Posted by Migen21 View Post
    You clearly missed the fact that I wrote my post using the 'snark' font - please go back and re-read.
    Second paragraph for sure. First paragraph? If you say so, that's fine by me.
    .
    Stout beers under trees, please.

Similar Threads

  1. They Can Hack Your Car Remotely Now.
    By SystemShock in forum The Lounge
    Replies: 17
    Last Post: 07-24-2015, 02:56 AM
  2. Going from hack cyclist to...anything better...
    By hawkman71 in forum Racing, Training, Nutrition, Triathlons
    Replies: 5
    Last Post: 05-07-2011, 07:00 PM
  3. Someone Trying to Hack My Account?
    By Zipp0 in forum The Lounge
    Replies: 21
    Last Post: 12-20-2010, 04:46 PM
  4. Is someone trying to hack my account?
    By My Own Private Idaho in forum SiteFeedback/Issues
    Replies: 4
    Last Post: 09-17-2010, 08:56 AM
  5. Hack a Mac
    By MikeBiker in forum The Lounge
    Replies: 4
    Last Post: 03-28-2008, 02:26 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •