It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
originally posted by: Op3nM1nd3d
a reply to: pl3bscheese
So you could basically own the system and no one would know since cameras are probably connected to it. That`s some real high security datacenter
originally posted by: kobalt7
I vaguely remember when the air gap hack was discovered, I cant remember who but he thought he was going crazy and everyone thought it was a hoax.
Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps
Qubes implements a Security by Isolation approach. To do this, Qubes utilizes virtualization technology in order to isolate various programs from each other and even to sandbox many system-level components, such as networking and storage subsystems, so that the compromise of any of these programs or components does not affect the integrity of the rest of the system.
Qubes lets the user define many security domains, which are implemented as lightweight Virtual Machines (VMs), or “AppVMs.” For example, the user can have “personal,” “work,” “shopping,” “bank,” and “random” AppVMs and can use the applications within those VMs just as if they were executing on the local machine. At the same time, however, these applications are well isolated from each other. Qubes also supports secure copy-and-paste and file sharing between the AppVMs, of course.
Computers housing the world’s most sensitive data are usually “air-gapped” or isolated from the internet. They’re also not connected to other systems that are internet-connected, and their Bluetooth feature is disabled, too. Sometimes, workers are not even allowed to bring mobile phones within range of the computers. All of this is done to keep important data out of the hands of remote hackers.
But these security measures may be futile in the face of a new technique researchers in Israel have developed for stealthily extracting sensitive data from isolated machines—using radio frequency signals and a mobile phone.
I use my smartphone for most of my internet usage,, after turning off locations, using a few apps, Fake GPS location, CM security(with private browsing) yandex/others, Android assistant,,Clean master for all the other stuff.
Would I be remotely safe?
I stopped reading when you suggested running deprecated versions of Winblows. Get some Linux in your life. Gentoo Hardened is a good choice, but well above the understanding of the average Microsuck user. There are easier to learn alternatives such as Heardened Ubuntu, which is the Ubuntu answer to Gentoo's security hardened OS.