<html>
<head>
<meta content="text/html; charset=ISO-8859-1"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<br>
-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
<br>
On 12/3/13, 11:10 PM, John Morris wrote:<br>
<span style="white-space: pre;">> On Tue, 2013-12-03 at 23:06
+0000, Gary Buhrmaster wrote:<br>
><br>
>> I think you misunderstand the actual interpretation of<br>
>> the term "air gap" in the security community. As<br>
>> Jay alludes to, a Faraday room (cage) may be part<br>
>> of the actual implementation. In some environments,<br>
>> EMSEC has to be considered.<br>
><br>
> An air gap is usually understood to mean an isolated
workstation or a<br>
> network disconnected from any link to 'the world.' Faraday
cages are<br>
> way beyond that basic level and you are talking TEMPEST
protection. The<br>
> problem is these terms predate WiFi.<br>
><br>
> Any device with a live (electrically) radio (WiFI/BT/NFC) has
to be<br>
> considered connected to the world, especially when you have
no access to<br>
> the software controlling it. Can you PROVE that your TV's
WiFi won't<br>
> quietly associate to a hidden ESSID when the Google
Streetview car<br>
> drives by and upload your viewing history? Not doubt it
would, PROVE it<br>
> won't?<br>
><br>
> Yes, seriously thinking this way for any length of time will
drive you<br>
> mad.<br>
><br>
><br>
> _______________________________________________<br>
></span><br>
Sort of, the isolated network may have an aisle server with
significant filtering and highly restricted access to transfer data
between information domains.<br>
<br>
But, for fun, *I* can prove my TV won't associate with anything. Not
a single one of them are network capable.<br>
They also don't show up on passive scans that ran for weeks or on
active scans. (No, I'm not *that* paranoid, but do do periodic
security scans and once, needed network access and had zero
connectivity and hence, tried quick and easy access.)<br>
<br>
Have *yet* to go mad, but think on it all the time. But then, I did
that in my military career in non-electronic terms, later, in
electronic terms and network terms. I'm also quite good at
asymmetric warfare.<br>
But then, in that last does lie madness. ;)<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v1.4.9 (Darwin)<br>
Comment: GPGTools - <a class="moz-txt-link-freetext" href="http://gpgtools.org">http://gpgtools.org</a><br>
Comment: Using GnuPG with Thunderbird - <a class="moz-txt-link-freetext" href="http://www.enigmail.net/">http://www.enigmail.net/</a><br>
<br>
iF4EAREIAAYFAlKesR0ACgkQ3XOy3AMq/gkT7QEAys/v+e+c7hkROybs6qjt/+ma<br>
fBFEpmVc2WdVlPQr5icA/j4+dQc9/vaDosHpqsECwJaG19oy/rSLDsn2B55uYDOd<br>
=xP3v<br>
-----END PGP SIGNATURE-----<br>
<br>
</body>
</html>