About IoT Hacking for Regular Humans

Forums Personal Topics Unbidden Thoughts About IoT Hacking for Regular Humans

This topic contains 23 replies, has 2 voices, and was last updated by  Josh Stern November 28, 2022 at 12:15 pm.

  • Author
    Posts
  • #122076

    josh

    More feedback: sub-band coding is often used & generic radio receiver/transmitter is often sabotaged in the mfg. ready stage to dampen or block the bands with sensitive info. Recs for non-tampered radios are seemingly needed.

    • #122103

      josh

      In some hardware components the signal dropping functionality is fixed, while in many others, it’s gated by environmental signals about ‘T’ (coming through wireless or electrical power). Many like to prototype & learn with popular electronics ecosystems like Arduino & AdaFruit so it would be helpful to take pairs of devices & see where the dropouts can be reliably turned off to restore full functionality, possibly using the kit itself.

  • #122096

    josh

    Bluetooth LE vs. Zigbee mesh also maps to UK/Russian/Trump vs. US/OhioU tech.

  • #122104

    josh

    Sources say that undocumented protocols are often low speed digital, like morse code.

  • #122105

    josh

    Lots of sounds feature an initial percussive/wide spectrum burst & then a more sustained lower frequency interval that trails off. Sources say to look at amplitude modulation in the sustained part of bursts.

  • #122131

    josh

    Lots of focus tonight on which combos of curl make pleasant sensations versus painful or merely uncomfortable ones. Is it just a matter of technique or are some EMF providing objects suitable while others are inherently unsuitable?

    Don’t know. My medium term plan ways always that GT would produce optimal sets of consumer desirable objects/kit & control the networking. The experience there isn’t limited in any way by what has gone before. The arty, pleasant examples that exist are demos of the possibility & promising combinations for research inspiration.

    On the other hand, the current world includes many decades of manufactured things that are secretly participating in spy & communication networks, delivering terrorist harassment to helpless target, and sometimes causing fatal autombile crashes. Interacting with those things is very much an issue of what is in place & how to make better use of or mitigate it.

  • #122191

    josh

    The majority of IoT components are undocumented for the public & focused on EMF harassament & spying. Relaying energy to neighbors is perhaps their most common activity. Each component has a permanent and often dynamic status of how likely it is to pass energy. In the Heine version of coding, it is often trying to direct energy at sensors which say “I am seeing hair” or “I am sensing P”, or “I am sensing EMP attack site” or “I am sensing dampness (could be urine from attacks)”. Some forms of control involve directing signals telling which sites should claim they have a hot target in range to receive energy & emit it at whatever looks most like a target. The radios like Bluetooth LE and Zigbee are sometimes used for this control function, communicating with individual IoT devices or the devices in a particular location. Solid things like metal or hard plastic may have a built in flexion response rather than an EMF emitting response.

  • #122192

    josh

    Some TI ids are the right type to send/receive longer range signals in the Trump/Russian/UK network. Probably there are databases which map ids to macs and visa versa, but I don’t know the details.

  • #122289

    josh

    We believe the story that very few if any Zigbee thins don’t come with a secret back door access that can convert them to operating in BLE networks.

  • #122410

    josh

    Consider the possibility of working out multi-dimensional control in multi-layered semi-supervised systems.

    Something like:

    High Layer – SMIL 2 Like interface (I mean granularity, not XML syntax) for scheduled events including both presentation & control

    Middle Layer – Systems of learned “gestures”

    Lower Layer – atomic bits of any BLE primitive of interest with a timing model, probably a digital clock.

    The learning system tries to optimize multi-criteria at each level. The basics is like Deep Learning networks, but other algorithms work at making the system more adaptive, reconfigurable, & efficient over time (see recentpaper selections)

    • #122435

      josh

      Some of the papers propose interesting approaches to the Q of how do you build up repertoire of valuable gestures that you can control & then compose combinatins of them where the composition process may/will cause some unknown level of interference. The IoT version of that problem is at the small numbers of steps with dense numerical arrays end of the spectrum, while many real world planning activities involve more steps & greater amounts of symbolic abstraction. I hope researchers will keep that range in mind & see to what extent the same conceptual/mathematical ideas work well at both ends.

      • #122439

        josh

        Let’s explain with the ez familiarity of planning a long car trip from City A address to City B address. We understand the basics & we are aided by looking up symbolic details that give us a symbolic route. We have stored knowledge routines of how to use route directions to read signs & operate a car – this involves driving, fuel, toll money, maintenance, etc.

        The plan could become more complicated by adding other simultaneous goals. Perhaps there is another City C to visit mid route. Perhaps there is an extra heavy load in the car. Adjusting the plan will involve some guessing about the effects of the extra variables. We might guess that the extra is a no go – 5000lb weight? forget that.

        In the case of the road trips, existing helpers like MapQuest/Google maps can provide the outline of some basic plans (which might be wrong). Suppose we were pioneers new to travel in a new land. In that case, we would still be at the level of working out which lands have passable terrain without river crossings that are too tough, or mountain ranges that are too high or icy, etc. Exploring new spaces involves searching for useful, reliable pieces that can later fit into a large whole.

        Most statistical theory deals with convergence of inference about uncertainty using repeated iid observations in a fixed sample space. Bandit problems deal with questions about which sample levers to pull when the action itsel has cost/rewards in additional to providing info for inference. Other extensions deal with drifts or sharp discontinuities in model parameters.

        In the exploratory pioneeer setting, we are still learning about variability of individual route pieces while trying to put together variable plans for larger routes with potentially extra conflicting factors (extra provisions in the wagon for a longer journey may force a slower speed…)

        So we value insightful views about how to analyze complex multi-level problems with simultaneous learning & experimentation at each level & potentially a lot of drift in model parameters & even model form. These models may eventually get a lot more complicated than what we have seen. For example, theory plays a big role in human thought about what the effects of combination where there are conflicting or missing theories, experience itself will promote theory revision. At the same time, familiar statistical considerations of dimensionality reduction & identifying orthogonality in sub-spaces are still very relevant. A good exercise will be to try and express & then parameterize, at least in a Bayesian way, all interesting theories of conflicting goals. The modeling can adjust these weights, in a formal or an informal weigh (start again using only the MAP (best a posteriori) model…)

        All of these multi-level things are examples of Deep Learning in settings that are not normally covered by Deep Learning techniques.

  • #122440

    josh

    Q: How can the higher levels be adaptively structured for learning?

    A: For formal/engineering study we have to define problem boundaries somewhere. Conceptually (perhaps about the level of implemented computation), we can pick a Situation Semantics of Objects/Space/Time at some levels of macro granularity which are expressive enough to describe all the conditions we want to model/deal with & precise enough to stand in a fixed probabilistic or fuzzy set relationship to what we can measure about those situations and/or care to use as semantically linked latent variables in modeling. Inside of that, we can define dynamic collections of graphs that represent situations of interet & change between those situations (caused by us, caused by the flow of time, the weather, or whatever…). We can use the language of situations to talk about how the graphs project to isolated sub-problems and what the corresponding graph network looks like there.

  • #122536

    josh

    For the language of higher level interactions, development should assume that it is eventually moving in the direction of multiple human actors, even if the existing work developed in a reference frame of a single individual.

  • #122891

    josh

    Informants say that interface usability along with quality & reliability of information & dynamic search protocols is important to the usability of Bluetooth Mesh Networking configurations.

    For GT it makes sense to create simulations for BLE and Zigbee mixing that model search/connections of interest in order to work out the best forms of server help/configuration control.

    • #122892

      josh

      Speed of response & the ability to dial in the desired scale of interest are also key & interrelated. Some connections may stay configured for a long time & save time on later searchs vs. the alternate case of reconfiguration. There again is some calculus of resource costs vs. performance.

      Defining & describing good overall metrics is important. The interface for that might involve choosing constraints.

  • #122982

    josh

    In the IoT implementation of AM style signaling, many micro units are positioned with a certain carrier frequency & phase – think of a filmy hose that pops a bubble at a certain rate & size. A kind of override hacking of the previous program involves directing energy to local positions so their phase changes to something else.

    At least that’s the vague understanding I got from my source.

  • #122984

    josh

    For experimental hacking, it would be desirable to have accurate analog simulations & languages/libraries of software controls with parameters that can be used in gestural/(media show like) semantics to create the effects that have been found to be the most interesting & significant – in some cases this is a sensation of EMF at a particular site & in other cases it’s like changing the RFID labels or directives on particular bits of IoT.

  • #123316

    josh

    The broad networks of IoT that provide sensor data to search queries are said to include some hardwired satellite type links, analogous to known servers for NTP. The data from the installed base is not encrypted, but drawing large amounts of summary data involves reading those hardwired “up links” using some intermediaries.

  • #123346

    josh

    Baby Ping learned to control a special radio in a semantic way. Software routines can substitute for semantic control. Signals can have parameters that include:

    a) Local semantic coordinates of max signal direction
    b) power
    c) spread
    d) AM carrier freq
    e) AM phase
    f) Overalayed AM signal (amp, etc)

    For receiver body coordinates, signal direction & spread are replace by profile of the sender directions that created “THIS SENSATION” (e.g. right foot tingling)

  • #123375

    josh

    The Deep State offensive system has been set up to focus on long range cyber attacks via gear that is often controlled/hackable using wireless signals. The main control consoles may be in military or paramilitary bunkers that are the last opponents to reform. In that case, the most practical defense may often involve local position of limited wireless controllers that periodically turn/disable to offensive elements of the gear – e.g. at cable interfaces, utility poles, utility stacks, etc.

  • #124945

    Josh Stern
    Moderator

    A large part of IoT power lies in the covert properties of the covertly installed base of man-made objects. This now covers most man-made objects, and many commandeered natural objects (like trees).

    Many of these objects have fixed Bluetooth LE mac addresses that they communicate with as servers. Intercepting those signals & posing as server is an important part of accessing their power.

    Folks are competitive. If spook has installed this crap everywhere, then some GT want to be using it to get key info ready ahead as they walk down a street. That means posing as those servers using some set of mechanisms.

  • #125079

    Josh Stern
    Moderator

    Again, reflecting the important of the satellite/server bases in the UK(“Russian”) nets of last year & still some now,

    In the short term, GT can use cultivation of more ‘I’ UK members who stay in now & jump to GT officially later, making use of their network access.

    In the short & longer term, because of the built in server dependencies in the installed base of IoT objects, we need relays that intercept & forward the server requests, keeping track of whatever macs & geolocation were relevant to the original, along with whatever is needed to return via the same or similar path.

You must be logged in to reply to this topic.