First of all we glue the camera, or how to protect themselves in the web space
A Life Technologies / / December 19, 2019
Glued eye webcam, incognito mode in the browser and to constantly scan the computer for viruses, which can take control of the microphone or camera... Can we crazy people who just want to be Security? Let's investigate.
Four years ago, the United States broke scandalAssociated with a user's privacy on the Internet. Aaron's a company that deals with rental laptops, accused that it installs on computers rental software that allows you to monitor the webcam device.
In Aaron's immediately tried to refute the information. Press service said that the software is set for tracing devices, which are not returned on time. And everything is good, but damning evidence has provided a couple from Wyoming.
The family took the laptop in the rental, and Aaron's header came a few days later, which was trying to pick up the device and use it as evidence showed the photos taken webcam. It later emerged that the collector had come because of accounting errors and the family could use my laptop for a long time, but the incident has already occurred, and it could be used against the company.
On the other case, peeping through the chamber I told user resource The Question Nicholas Schmidt:
After my friend connects to the camera all the subscribers of one of the service providers to easily gain access, I always close my camera. Cool, by the way, to observe the expression of the human face behind the computer.
P.S. He did it not with evil intentions. Simply CEO of the network provider of his friend, and my friend checked vulnerability. Well, and he allowed himself a five-minute prank.
In general, there are reasons to think that you may well observe. And not just with the camera. Here are some ways to avoid it.
Webcam and microphone
The most reliable way to stop the surveillance through the camera - to stick her eye opaque tape. Let you will be considered a schizophrenic or crazy, but if you doubt your privacy naplyuyte it and find a piece of electrical tape.
With microphone it is not so simple. It is also possible to glue, and it is to some extent reduce the chance that you will be able to hear. But maybe better to use the software.
For example, Micro Snitch app for OS X is always active in the background checks is whether a program is accessing your camera or microphone.
Price: 299 rubles
There is a utility for Windows Webcam Blocker Pro. It has similar features, however, it is worth much more expensive.
Unfortunately, these apps - not one hundred percent guarantee that you will not be able to hear. Therefore, if you can not trust them, physical methods will be effective.
location
If you do not disable geolocation services, then your browser is almost always knows where you are. You can disable services in the settings, but you can fool the browser, telling him the wrong coordinates.
In Chrome, you can do this by pressing Ctrl + Shift + Ii open developer tools. Then you need to press Escape to enter the console, open the tab "Emulation» (Emulation) and change the latitude and longitude coordinates.
In Firefox, you can do the same thing, but with the help of expansion. Geolocater will inform the browser are the coordinates that you specify.
Surveillance of the keyboard
Programs that can keep track of information entered from the keyboard, are publicly available. Many of them are presented as a means to store all that you have entered, but eloquent names like Spy Keylogger clearly alludes to the main purpose of such tools.
An attacker enough to get access to your computer for a few minutes to install the utility. You do not even need to be a programmer - interface of the program can understand and student. In addition, there are more sophisticated ways to get to your keyboard even without physical contact with the computer.
There are several ways of dealing with the surveillance of the keyboard:
- Use a virtual onscreen keyboard. Since malware explicitly track keystrokes, it can work.
- Use abbreviations. For example, the standard tools of OS X can be assigned to the reduction of sentence, if you type the word "parolotvk", this reduction will be replaced by the actual password.
Methods are not hundred percent, so in addition to it's worth checking your computer a couple of vendors.
On the one hand, this article looks like a raving lunatic who considers himself an important person, for which all follow. On the other hand, I do not exclude the fact that the people for whom, and indeed may follow quite a lot. And surveillance may be organized as a for profit or for fun.
And do not forget about Hemingway. No one believed him when he said that he was being followed. That's only in the 1980 FBI declassified business writer and the fact that the surveillance was confirmed.