/All/
|
index
catalog
recent
update
post
|
/math/
/tech/
/anime/
/misc/
/free/
/meta/
|
Guide
dark
mod
Log
P127306
How do I know if my USB WiFi Adapter or USB drive has DMA?
Sun 2024-11-10 22:50:28
link
reply
e5b26b6b934fd18cff858aecc85f095e19b537b5aa0a6a89980b007445b3bed3.png
467 KiB 965x699
WiFi USB adapters typically do not support Direct Memory Access (DMA) in the same way that internal components like PCIe devices do. DMA is a feature that allows certain hardware subsystems to access the main system memory independently of the *****U, which can improve performance by offloading data transfer tasks.
[bold:
Most USB devices, including WiFi adapters, rely on the USB protocol for communication, which generally involves the *****U in data transfer processes.
]
However, some advanced USB controllers and devices may implement features that allow for more efficient data handling, but this is not the same as traditional DMA.
[bold:
To determine if a USB flash drive supports Direct Memory Access (DMA)
]
, you typically won't find explicit labeling or specifications on the packaging. DMA support is more about the underlying hardware architecture and how the device interacts with the host system rather than a feature that is commonly advertised. However, here are some indicators and methods to assess DMA support:
Note: DMA support is not typically advertised on consumer-level USB flash drives
> 1.
[bold:
USB Controller
]
:
The USB controller in the host system (e.g., your computer) plays a significant role in DMA capabilities. Most modern USB controllers (especially those supporting USB 3.0 and above) are designed to handle DMA. If the USB flash drive is connected to a system with a USB 3.0 or higher controller, it is more likely to utilize DMA.
> 2.
[bold:
Device Class
]
:
Some USB devices, particularly those designed for high-performance applications (like SSDs or high-speed data transfer devices), may be more likely to support DMA. Look for devices marketed for high-performance use.
> 3.
[bold:
Technical Specifications
]
:
Check the technical specifications or datasheet provided by the manufacturer. While it may not explicitly mention DMA, details about the data transfer methods or performance metrics can provide clues. Look for mentions of "high-speed data transfer" or "efficient data handling."
> 4.
[bold:
Manufacturer Support
]
:
If you have a specific model in mind, consider reaching out to the manufacturer directly. They may provide detailed information about the device's architecture and whether it supports DMA.
In summary, while there are no clear indicators on consumer packaging that directly state DMA support, understanding the USB version, the type of controller, and researching the specific device can help you assess the likelihood of DMA capabilities.
Referenced by:
P127412
P127310
Sun 2024-11-10 23:28:30
link
reply
Should I remove my *****U fan as I heard that can fingerprint me?
P127311
Mon 2024-11-11 01:55:25
link
reply
>DMA is a feature that allows certain hardware subsystems to access the main system memory independently of the *****U, which can improve performance by offloading data transfer tasks.
So basically you're saying some USB devices can bypass ring security architecture of the *****U by just writing directly to protected ring 0 memory blocks on the RAM?
I wonder if USB bluetooth dongles can do that too.
Referenced by:
P127323
P127316
Mon 2024-11-11 03:52:56
link
reply
solve it at the root of the problem and make a pci host that does not allow for dma from XX||YY||... classcodes, the device cant fake the classcode and keep working normally.
The captcha is broken.
Referenced by:
P127323
P127323
Mon 2024-11-11 04:05:55
link
reply
P127311
Why would you use USB bluetooth dongles
Hmmmm let me guess a mechanical keyboard gamer mouse fage
P127316
Can you disable DMA in coreboot/libreboot?
>The captcha is broken.
yeah we know chuddy
Referenced by:
P127417
P127326
Mon 2024-11-11 04:21:23
link
reply
https://security.stackexchange.com/questions/100743/can-my-mouse-have-virus-and-infect-other-machines
>But if you expect to see such a feature anywhere, it would be on overly complicated and expensive peripherals targeted at gamers.
The settings for a gaming mouse, particularly programmable settings like DPI (dots per inch), button assignments, and lighting configurations, are typically stored in software or stored in:
>Onboard Memory:
Many gaming mice come with onboard memory, which allows them to store settings directly on the mouse itself. This means that the settings can be retained even when the mouse is disconnected from the computer. Users can configure their settings using the manufacturer's software, and these settings are saved to the mouse's internal memory.
>onboard memory in a gaming mouse can potentially be infected with malware, although this is relatively rare.
> Malicious Firmware Updates
>
[bold:
Exploiting Vulnerabilities
]
> If there are vulnerabilities in the mouse's firmware or the software used to configure it, malware could exploit these vulnerabilities to modify the settings stored in the onboard memory.
> USB Device Attacks
> In some cases, malware can target USB devices, including gaming mice. This could involve altering the firmware or settings stored in the onboard memory.
>> MouseJacking
>
https://blog.netwrix.com/2019/05/01/what-are-mousejacking-attacks-and-how-to-defend-against-them/
P127408
Mon 2024-11-11 20:22:17
link
reply
https://lainchan.org/sec/res/25114.html
Referenced by:
P127445
P127412
Mon 2024-11-11 21:55:08
link
reply
41be448eb05e97218b8f29c3da271e4701cdc519ef19123628f4a4c998c2edc7.jpg
240 KiB 1920x1080
P127306
>Although USB (unlike FireWire) does not natively use DMA, the addition of PCIe lanes to USB-C connectors (with Thunderbolt 3/USB 4) means that a DMA attack via a USB-C port could be a real possibility.
https://hackaday.com/2021/03/31/direct-memory-access-data-transfer-without-micro-management/
>USB does not allow remote DMA; nowhere in the USB on-the-wire protocol are there memory addresses. Only the driver and/or the OS can control from/to which memory addresses USB data is read/written.
https://security.stackexchange.com/a/72270
A malicious driver could setup a DMA-like backdoor for a malicious USB device to use but if you are running a malicious driver then you already have a big problem.
P127417
Mon 2024-11-11 23:48:07
link
reply
P127323
>Can you disable DMA in coreboot/libreboot?
no
P127443
Tue 2024-11-12 02:15:39
link
reply
p127417
how do you disable it or mitigate it is there like a dis n dat type male to female adapter like a datablocker or something if get wut i mean ?
P127445
Tue 2024-11-12 02:19:22
link
reply
P127408
reaching patch levels of forced content here
P127449
Tue 2024-11-12 03:34:40
link
reply
>expensive peripherals targeted at gamers.
Where I live the wired mouses are more expensive and hard to find in store unless you buy a new PC.
You have to order them online or buy them used, the "electronics" stores only carry wireless mouses and keyboards basically.
I wonder if that was a deliberate policy, pushing a product no one actually wanted, to introduce vulnerabilities.
Referenced by:
P127464
P127451
Tue 2024-11-12 03:44:07
link
reply
96ef6a6623c1f89b090e2f46b4dfc58dbe2af4f9df0fe99612827f3859683f23.jpg
42.8 KiB 474x348
https://www.neowin.net/forum/topic/1134178-why-is-it-getting-harder-to-find-a-wired-mouse/
>When I go to the store and shop for a mouse, 90% of the selections are wireless and only 10% are wired. And the wired ones are not all that great as they are only the usual 3 button ones. There's no good wired mouse with the extra buttons to go back and forward on the web browser. All of the good mice are wireless.
>Why are the wired mouse selections so slim now?
There's reason to think that the retail stores colluded with a group to introduce a widespread vulnerability to everyone's PCs.
So I would do an investigation into the drivers of all the wireless mice and keyboards and investigations into the boards of directors of the companies that pushed them, considering there's a massive vulnerability there and a mysterious push to introduce it to computers across world.
Like, this is a national cyber security issue, there's likely a conspiracy to break down Western cyber security and these companies colluded together with espionage groups.
Referenced by:
P127460
P127452
Tue 2024-11-12 03:51:19
link
reply
d00340fbb90ffe51eae641989a218d534207530a351edb34376d92f6b63fce23.jpg
53.5 KiB 474x658
I don't like wireless mouses at all even just for practical reasons, you have to put batteries in them and those batteries die sporadically. Meaning, you have to buy batteries. Even if you use rechargeable ones, you have to replace them every two weeks or so.
Even without considering the security issue, they suck and are a hassle for consumers.
So why the big push for them?
I tried looking for a wired mouse at a major retailer like I said and I think the one I found that time was $40 and shitty as hell so I ended up buying a wireless mouse that time even though I hate them.
Considering the EXTREME vulnerability mentioned from USB devices for certain motherboards, the next thing I'd do is identify the models of malicious wireless mice and keyboards and find out what corporate people selected them for their retail stock and treat them as high likelihood foreign agents and surveil them.
The wireless mouse thing doesn't seem organic to me, they're a worse product and only have niche situations where they'd be useful.
Referenced by:
P127461
P127457
Tue 2024-11-12 04:10:17
link
reply
I guess wired mice are much much cheaper to produce too (1/3rd the price to produce), but Western retailers basically cleared their shelves of them, leaving only shitty wired mice for sale and marking up their price to further discourage people using them.
It's all very suspicious and it looks like there's a major attack vector through wired mice, making those retailer's choices a national security threat.
It really looks like they deliberately sabotaged Western cyber infrastructure without a legitimate profit motive to do so, putting backdoors into basically every *****ing computer in the USA through boycotting of wired mice and keyboards.
If there was a demand for wireless mice and keyboards, why do the computer sellers themselves ship out computers with wired mice and keyboards? I think there's little demand for wireless mice and keyboards in the first place.
https://en.wikipedia.org/wiki/Logitech
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=logitech
Are all of these "accidental" vulnerabilities?
Did this company blackmail or bribe the boards of directors of various retailers to push exploitable products?
Are they affilitated with any espionage missions known to date? Who are they working for?
Can you kidnap and torture the details out of their board of directors and engineers, or are they deliberately staying out of your reach because they know they're participating in an espionage mission against the Western nations (which should be assumed for an enemy nation's interests)?
If they're deliberately staying where it would be hard to arrest them, that's an indication they were knowing collaborators.
P127458
Tue 2024-11-12 04:18:19
link
reply
https://aware7.com/blog/logitech-hardware-vulnerability-still-exploitable/
>The latest firmware update is intended to close a security hole in Logitech hardware devices that allows access to wireless keyboards or mice. However, the update did not completely close this vulnerability.
So they issue bogus patches too.
Like, I'd kidnap the board of directors of logitech and have them bound and gagged in the back of a truck before raiding Logitech and getting the rest of the employees.
You don't need to surveil really if you're okay with torturing information out of foreign agents.
You can find out which groups leveraged logitech to break Western cyber security infrastructure by just seeing who uses the attack vectors basically. China makes the *****ing things don't they? So that's the one that's actually behind this mass espionage mission, and other groups just exploit it.
https://www.chinadaily.com.cn/a/202108/12/WS61147bbba310efa1bd6684ce.html
>GENEVA-Swiss computer peripherals manufacturer Logitech will invest more in the Chinese market in the future, said Bracken Darrell, the company's CEO, who was bullish on the business outlook in China and his company there.
P127460
☣🃏🐾👌 (💯) 📵
Tue 2024-11-12 04:30:04
link
reply
P127451
Don't let (((them))) take your wires. Or physical media, installable operating systems, or user manuals. Fight for optical drives and wired ethernet.
P127461
Tue 2024-11-12 04:32:23
link
reply
P127452
>the next thing I'd do is identify the models of malicious wireless mice and keyboards and find out what corporate people selected them for their retail stock and treat them as high likelihood foreign agents and surveil them.
How can we (YOU) do that I would like to do that
P127463
Tue 2024-11-12 04:34:50
link
reply
Smart traitors are more dangerous than dumb ones.
I wouldn't spare "smart" traitorous or foreign engineers involved in an espionage mission against the West.
Their being smarter is even more reason to kill them.
Boards of directors are a dime a dozen. They're easily replaced. You'd just want to make sure you replaced them with your guys, people you have tested for national loyalty already. And yeah, your new board of directors isn't going to get the C*****'s special deals for running espionage missions, so they may underperform some because the company no longer has foreign intelligence agencies laundering money to it through "special deals" for C***** foreign agents.
Referenced by:
P127480
P127464
Tue 2024-11-12 04:36:18
link
reply
P127449
I literally bought a onn.™ wired mouse at walmart the hardest part was getting past the the walmartians libtards and trump tards to get to it then I bought mountain dew and donuts and left it was p great
P127466
Tue 2024-11-12 04:37:09
link
reply
>How can we (YOU) do that I would like to do that
One way is to set up decoy targets or surveil likely targets of these exploits, monitoring radio communications around them, their devices, and telecom connections to identify when an attack has occured and then identify the attack vector and reverse engineer the attack.
Referenced by:
P127472
P127472
Tue 2024-11-12 04:44:27
link
reply
P127466
Why dont we just stalk and harrass them
P127480
upvoted
Tue 2024-11-12 05:05:06
link
reply
P127463
>C***** foreign agents
You mean Brazilian
[spoiler:
Israeli ✡️
]
Referenced by:
P127484
Mod Controls:
x
Reason: