INDEX 1 June 2022
Hack impossible

OK I still have one machine running Linux (see MI5 trashes my computers). I have unplugged the ethernet, disconnected the wiring so that it is physically impossible for the wifi to work and the system says the Bluetooth does not exist. There is no bluetooth. I presume this is because it's the same system as the wifi.

On top of that I have run a Linux command killing radio connections. My issue is that the archives I keep for my blog site are getting corrupted and stuff is going missing. So I am archiving using a more secure system that only works in Linux and Mac. You can't use it in Windows, but, heh, I don't care.

On top of that I am running sha256sum, which is a Linux command that gives you a read out of a unique signature, so it is easy to see subsequently if someone has tampered with your archive.
All well and good and simple enough but then I decide to pipe the sha256 output to a text file (see command 77) and would you believe it, the text file pops up immediately and there is no signature. This is impossible.

Usually it takes quite a while to produce the signature. It's no big deal since I run sha256sum (see command 78) and copy the output to the blank file.

I have just run the command again (to check that I had not made some sort of mistake) and sure enough it outputted a text file containing the signature. Oh and by the way, a little earlier on you can see the rfkill command (see command 65) which should deny radio (ie wifi) access. The ufw commands are setting up the firewall. Deny 22 is to close SSH. I have a firewall even though I unplug the ethernet. This is belt, braces and a second set of belt and braces.

But the point is, this could not happen on its own. Computers are not like that. A hacker has done this on purpose.

But how?

Somebody recently gently suggested that I must be paranoid. I had to point out that if you are not paranoid, you are not paying attention.
INDEX Posted by Jonathan Brind. 1 June, 2022