• 0 Posts
  • 89 Comments
Joined 2 years ago
cake
Cake day: June 11th, 2023

help-circle




  • Ah a fellow perun addict.

    Honestly I think he oversold the effectiveness of the systems. The work I did is still ongoing so I’m up to speed on the available systems, though mostly on the RF side. If you watch the stuff coming out of Ukraine the drones aren’t really being impeded all that much and if you know how to use ardupilot and selectively enable your data link you can pretty much get away with whatever you want because the US isn’t gonna allow anyone to jam GPS right next to multiple major airports. If you want to avoid even relying on GPS there are starting to be mature solutions out there too.






  • Yeah the FPV community is way better because they actually have to know what they’re doing mostly. They’re mildly noncompliant but only regarding the regs that shouldn’t apply to the size of stuff they fly; RID, registration, and BVLOS don’t make sense for airframes lighter than a goose. They tend to avoid other people because they understand the public is wary of drones and they’re wary of Karens and untrained cops. They put far more hours on their airframes than any of the other amateur operators but every single time I’ve been near a drone doing something dangerous, stupid, or annoying it was a DJI.




  • As you’ve probably seen you can buy semi dumb security cameras from Armcrest/Loryta/Empiretech/whatever that’ll run off of a barrel jack and/or Ethernet cable. Most of them have the option to insert an SD card and they’ll event log to that, at which point just don’t plug in the Ethernet cable except to manually pull recordings.

    One other thing to think about is maybe consider “Frigate NVR” running on a pi or something and connected to cameras on it’s own wifi or Ethernet network that’s isolated from the Internet and your LAN. It’ll make local access easier because as with just about anything security related you’ll want to periodically check to make sure it’s actually working. You should be able to setup the pi to serve as the WiFi access point for all this.


  • I used to do some work with Qualcomm and ARM IP. They both need to die. ARM is holding back all manner of technologies with their absolutely insane and byzantine licensing scheme and Qualcomm is one of the most evil tech companies in existence, you just don’t hear about them because their particular evil is constrained to B2B interactions.






  • Nothing is perfect. Your goal is to make attacks expensive as shit. Like ideally requiring dozens of hours of electron microscope time to pull off.

    You can do a lot to that end though.

    Use a mostly read only OS if you can, if you’re enterprising, a custom yocto build with most of the rootfs read only, otherwise a statically defined system like nix that can be readily deleted and rebuilt in minutes. There are configs out there for deleting root on every bootup and having the system automatically repopulate the filesystem. Enable secure boot if you can, it’s frankly your best line of defense. Any of these options are sufficiently weird that designing exploits for them would be a suffer fest.

    Forget nail polish, fill screw holes with RTV and if you’re enterprising, the USB ports. At that point you can still get into the system but it’ll be obvious that someone scraped the shit out. You can simply swap the ports for fresh ones with a solder job if needed. If you don’t need this, use epoxy, get some all over the case seam. For the charging port, if it’s USB C PD, I’d need to reread the spec but you should be able to cut D-/D+ and the SS lines with an exacto blade right next to the connector and still be able to charge, just don’t hit the VCC, GND, and CC lines.

    Finally, make a kwikset key trap and use it as either a lockbox lock for your stuff or the lock to your house. Kwikset should lull people into a false sense of insecurity but if they try to pick it they’ll suddenly be in a situation where they either need to go overt or somehow replace your lock before you get back. Keep things weird, your goal is to get an adversary, even one with infinite resources, to make ridiculous mistakes.