P127306 How do I know if my USB WiFi Adapter or USB drive has DMA? link reply
WiFi USB adapters typically do not support Direct Memory Access (DMA) in the same way that internal components like PCIe devices do. DMA is a feature that allows certain hardware subsystems to access the main system memory independently of the *****U, which can improve performance by offloading data transfer tasks.

[bold: Most USB devices, including WiFi adapters, rely on the USB protocol for communication, which generally involves the *****U in data transfer processes.] However, some advanced USB controllers and devices may implement features that allow for more efficient data handling, but this is not the same as traditional DMA.

[bold: To determine if a USB flash drive supports Direct Memory Access (DMA)], you typically won't find explicit labeling or specifications on the packaging. DMA support is more about the underlying hardware architecture and how the device interacts with the host system rather than a feature that is commonly advertised. However, here are some indicators and methods to assess DMA support:

Note: DMA support is not typically advertised on consumer-level USB flash drives

> 1. [bold: USB Controller]:
The USB controller in the host system (e.g., your computer) plays a significant role in DMA capabilities. Most modern USB controllers (especially those supporting USB 3.0 and above) are designed to handle DMA. If the USB flash drive is connected to a system with a USB 3.0 or higher controller, it is more likely to utilize DMA.

> 2. [bold: Device Class]:
Some USB devices, particularly those designed for high-performance applications (like SSDs or high-speed data transfer devices), may be more likely to support DMA. Look for devices marketed for high-performance use.

> 3. [bold: Technical Specifications]:
Check the technical specifications or datasheet provided by the manufacturer. While it may not explicitly mention DMA, details about the data transfer methods or performance metrics can provide clues. Look for mentions of "high-speed data transfer" or "efficient data handling."

> 4. [bold: Manufacturer Support]:
If you have a specific model in mind, consider reaching out to the manufacturer directly. They may provide detailed information about the device's architecture and whether it supports DMA.

In summary, while there are no clear indicators on consumer packaging that directly state DMA support, understanding the USB version, the type of controller, and researching the specific device can help you assess the likelihood of DMA capabilities.
P127310 link reply
Should I remove my *****U fan as I heard that can fingerprint me?
P127311 link reply
>DMA is a feature that allows certain hardware subsystems to access the main system memory independently of the *****U, which can improve performance by offloading data transfer tasks.

So basically you're saying some USB devices can bypass ring security architecture of the *****U by just writing directly to protected ring 0 memory blocks on the RAM?

I wonder if USB bluetooth dongles can do that too.
P127316 link reply
solve it at the root of the problem and make a pci host that does not allow for dma from XX||YY||... classcodes, the device cant fake the classcode and keep working normally.

The captcha is broken.
P127323 link reply
P127311
Why would you use USB bluetooth dongles
Hmmmm let me guess a mechanical keyboard gamer mouse fage

P127316
Can you disable DMA in coreboot/libreboot?

>The captcha is broken.
yeah we know chuddy
P127326 link reply
https://security.stackexchange.com/questions/100743/can-my-mouse-have-virus-and-infect-other-machines
>But if you expect to see such a feature anywhere, it would be on overly complicated and expensive peripherals targeted at gamers.

The settings for a gaming mouse, particularly programmable settings like DPI (dots per inch), button assignments, and lighting configurations, are typically stored in software or stored in:

>Onboard Memory:
Many gaming mice come with onboard memory, which allows them to store settings directly on the mouse itself. This means that the settings can be retained even when the mouse is disconnected from the computer. Users can configure their settings using the manufacturer's software, and these settings are saved to the mouse's internal memory.

>onboard memory in a gaming mouse can potentially be infected with malware, although this is relatively rare.
> Malicious Firmware Updates
> [bold: Exploiting Vulnerabilities]
> If there are vulnerabilities in the mouse's firmware or the software used to configure it, malware could exploit these vulnerabilities to modify the settings stored in the onboard memory.
> USB Device Attacks
> In some cases, malware can target USB devices, including gaming mice. This could involve altering the firmware or settings stored in the onboard memory.


>> MouseJacking
>https://blog.netwrix.com/2019/05/01/what-are-mousejacking-attacks-and-how-to-defend-against-them/
P127408 link reply
P127412 link reply
P127306
>Although USB (unlike FireWire) does not natively use DMA, the addition of PCIe lanes to USB-C connectors (with Thunderbolt 3/USB 4) means that a DMA attack via a USB-C port could be a real possibility.
https://hackaday.com/2021/03/31/direct-memory-access-data-transfer-without-micro-management/

>USB does not allow remote DMA; nowhere in the USB on-the-wire protocol are there memory addresses. Only the driver and/or the OS can control from/to which memory addresses USB data is read/written.
https://security.stackexchange.com/a/72270

A malicious driver could setup a DMA-like backdoor for a malicious USB device to use but if you are running a malicious driver then you already have a big problem.
P127417 link reply
P127323
>Can you disable DMA in coreboot/libreboot?
no
P127443 link reply
p127417
how do you disable it or mitigate it is there like a dis n dat type male to female adapter like a datablocker or something if get wut i mean ?
P127445 link reply
P127408
reaching patch levels of forced content here
P127449 link reply
>expensive peripherals targeted at gamers.

Where I live the wired mouses are more expensive and hard to find in store unless you buy a new PC.

You have to order them online or buy them used, the "electronics" stores only carry wireless mouses and keyboards basically.

I wonder if that was a deliberate policy, pushing a product no one actually wanted, to introduce vulnerabilities.
P127451 link reply
https://www.neowin.net/forum/topic/1134178-why-is-it-getting-harder-to-find-a-wired-mouse/

>When I go to the store and shop for a mouse, 90% of the selections are wireless and only 10% are wired. And the wired ones are not all that great as they are only the usual 3 button ones. There's no good wired mouse with the extra buttons to go back and forward on the web browser. All of the good mice are wireless.

>Why are the wired mouse selections so slim now?


There's reason to think that the retail stores colluded with a group to introduce a widespread vulnerability to everyone's PCs.

So I would do an investigation into the drivers of all the wireless mice and keyboards and investigations into the boards of directors of the companies that pushed them, considering there's a massive vulnerability there and a mysterious push to introduce it to computers across world.

Like, this is a national cyber security issue, there's likely a conspiracy to break down Western cyber security and these companies colluded together with espionage groups.
P127452 link reply
I don't like wireless mouses at all even just for practical reasons, you have to put batteries in them and those batteries die sporadically. Meaning, you have to buy batteries. Even if you use rechargeable ones, you have to replace them every two weeks or so.

Even without considering the security issue, they suck and are a hassle for consumers.

So why the big push for them?

I tried looking for a wired mouse at a major retailer like I said and I think the one I found that time was $40 and shitty as hell so I ended up buying a wireless mouse that time even though I hate them.

Considering the EXTREME vulnerability mentioned from USB devices for certain motherboards, the next thing I'd do is identify the models of malicious wireless mice and keyboards and find out what corporate people selected them for their retail stock and treat them as high likelihood foreign agents and surveil them.

The wireless mouse thing doesn't seem organic to me, they're a worse product and only have niche situations where they'd be useful.
P127457 link reply
I guess wired mice are much much cheaper to produce too (1/3rd the price to produce), but Western retailers basically cleared their shelves of them, leaving only shitty wired mice for sale and marking up their price to further discourage people using them.

It's all very suspicious and it looks like there's a major attack vector through wired mice, making those retailer's choices a national security threat.

It really looks like they deliberately sabotaged Western cyber infrastructure without a legitimate profit motive to do so, putting backdoors into basically every *****ing computer in the USA through boycotting of wired mice and keyboards.

If there was a demand for wireless mice and keyboards, why do the computer sellers themselves ship out computers with wired mice and keyboards? I think there's little demand for wireless mice and keyboards in the first place.

https://en.wikipedia.org/wiki/Logitech

https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=logitech

Are all of these "accidental" vulnerabilities?

Did this company blackmail or bribe the boards of directors of various retailers to push exploitable products?

Are they affilitated with any espionage missions known to date? Who are they working for?

Can you kidnap and torture the details out of their board of directors and engineers, or are they deliberately staying out of your reach because they know they're participating in an espionage mission against the Western nations (which should be assumed for an enemy nation's interests)?

If they're deliberately staying where it would be hard to arrest them, that's an indication they were knowing collaborators.
P127458 link reply
https://aware7.com/blog/logitech-hardware-vulnerability-still-exploitable/

>The latest firmware update is intended to close a security hole in Logitech hardware devices that allows access to wireless keyboards or mice. However, the update did not completely close this vulnerability.

So they issue bogus patches too.

Like, I'd kidnap the board of directors of logitech and have them bound and gagged in the back of a truck before raiding Logitech and getting the rest of the employees.

You don't need to surveil really if you're okay with torturing information out of foreign agents.

You can find out which groups leveraged logitech to break Western cyber security infrastructure by just seeing who uses the attack vectors basically. China makes the *****ing things don't they? So that's the one that's actually behind this mass espionage mission, and other groups just exploit it.

https://www.chinadaily.com.cn/a/202108/12/WS61147bbba310efa1bd6684ce.html

>GENEVA-Swiss computer peripherals manufacturer Logitech will invest more in the Chinese market in the future, said Bracken Darrell, the company's CEO, who was bullish on the business outlook in China and his company there.

P127460 ☣🃏🐾👌 (💯) 📵 link reply
P127451
Don't let (((them))) take your wires. Or physical media, installable operating systems, or user manuals. Fight for optical drives and wired ethernet.
P127461 link reply
P127452
>the next thing I'd do is identify the models of malicious wireless mice and keyboards and find out what corporate people selected them for their retail stock and treat them as high likelihood foreign agents and surveil them.

How can we (YOU) do that I would like to do that
P127463 link reply
Smart traitors are more dangerous than dumb ones.

I wouldn't spare "smart" traitorous or foreign engineers involved in an espionage mission against the West.

Their being smarter is even more reason to kill them.

Boards of directors are a dime a dozen. They're easily replaced. You'd just want to make sure you replaced them with your guys, people you have tested for national loyalty already. And yeah, your new board of directors isn't going to get the C*****'s special deals for running espionage missions, so they may underperform some because the company no longer has foreign intelligence agencies laundering money to it through "special deals" for C***** foreign agents.
P127464 link reply
P127449
I literally bought a onn.™ wired mouse at walmart the hardest part was getting past the the walmartians libtards and trump tards to get to it then I bought mountain dew and donuts and left it was p great
P127466 link reply
>How can we (YOU) do that I would like to do that

One way is to set up decoy targets or surveil likely targets of these exploits, monitoring radio communications around them, their devices, and telecom connections to identify when an attack has occured and then identify the attack vector and reverse engineer the attack.
P127472 link reply
P127466
Why dont we just stalk and harrass them
P127480 upvoted link reply
P127463
>C***** foreign agents

You mean Brazilian [spoiler: Israeli ✡️]
x