This maybe a dumb question but i became paranoid all of a sudden and wanted some answers because i can’t find it anywhere else nor can i sleep without it. Like even if i did flash linux on a lets say amd laptop couldn’t the chip itself be spying on me ? Also i understand bootloaders are stored or rom is there a way to know what else is stored on it are roms open source ? Are cpu’s open source and companies like asus store their logos and shit on their mother boards so what else could they be storing ? Are there open source alternatives for these parts ? Are we all being privacy cautios for nothing ? I know we can use firewall but wouldn’t the chip integrated have the ability to bye pass it ?
I know there are linux laptops but having a pre installed linux and some switches isn’t gonna solve the problem do they use open source roms and motherboard ? Are there any fully open source chipsets ? I want to know the same about smartphones too ?
IMPORTANT EDIT : Please don’t suggest alternatives like dumb phone i wanna know if there is any way to know or ensure we are not spied upon while using smartphones or laptop . And i don’t care about my os spying on me or the apps apps or web spying on me all i wanna know is if the hardware i use are spying on me and if not how do you know ? . Also which is better in terms of open source and privacy intel or amd ?
ANOTHER IMPORTANT EDIT : I am also not concerned by my isp tracking me or someon hacking me as i said all i care about is the hardware doing me in .
LAST EDIT I HOPE : AS I SAID MULTIPLE TIMES AND STILL PEOPLE UNDERSTAND IS I DON’T CARE IF ANYTHING OTHER THAN THE HARDWARE IS SPYING ON ME . LIKE ARE YOU TELLING ME THAT TOP CYBERSECURITY WORKERS OR ELITE HACKERS ARE JUST HOPING THEIR HARDWARE IS NOT SPYING ON THEM AND THERE IS NO WAY FOR AN ELITE HACKER OR CYBERSECURTY WORKER TO ENSURE THEY ARE NOT BEING SPIED BY THEIR HARDWARE OR IS THERE NO OTHER FULLY OPEN SOURCE HARDWARE THEY CAN BUY ?I’M NOT INTERNET SHOUTING OR WANTING TO BE RUDE I JUST WANNA GET THE POINT ACROSS ALSO PLEASE DON’T AVOID THIS AND ANSWER SOMETHING ELSE I JUST WANNA KNOW THIS SPECIFIC THING.
EDIT: LET ME MAKE IT VERY CLEAR I’M JUST A RUN OF THE MILL GUY BYING RUN OF THE MILL LAP AND PHONE AND USING IT I AM NOT BEING TRACKED BY NSA I’M SURE OF THAT BECAUSE I AM NOT THAT INTERESTING EVEN IF I WERE ITS NOT THE QUESTION UNLESS THE CIA OR NSA IS MAKING 1000 OF LAPS TO CATCH ME . YOU HAVE NO OBLIGATION TI ANSWER ME AND I AM GRATEFULL FOR YOUR ANSWERS BUT PLEASE ANSWER WHAT I WANT TO KNOW I FEEL LIKE YOU GUYS AND GALS DON’T EVEN COME CLOSE TO THE SUBJECT.
I am also quite interested in this. It is not something that keeps me awake at night, and I am not particularly paranoid about it. But I find that working towards answering this question is a fun frame from which to learn about electronics, radio communications, and networking.
Since this appears to be something that is causing you some anxiety, I think it is better if I start by giving you some reassurance in that I have not yet managed to prove that any electronic device is spying on me via a hidden chip. I don’t think it is worth being paranoid about this.
I can explain some things that could be done to test whether a Linux computer spying. I am not suggesting that you try any of this. I am explaining this to you so that you can get some reassurance in the fact that, if devices were spying on us in this manner, it is likely that someone would have noticed by now.
The “spy” chip needs some way to communicate. One way a chip might communicate is via radio waves. So, the first step would be to remove the WiFi and Bluetooth dongles and any other pieces of hardware that may emit radio waves during normal operation. There is a tool called a “Spectrum Analyzer” that can be used to capture the presence of specific radio frequencies. These devices are now relatively affordable, like the tinySA, which can measure the presence of radio frequencies of up to 6 GHz.
One can make a Faraday cage, for example, by wrapping the PC with a copper-nickel coated polyester fabric to isolate the PC from the radio waves that are coming from the environment. The spectrum analyzer antennas can be placed right next to the PC and the device is left to measure continuously over several days. A script can monitor the output and keep a record of any RF signals.
Since phones are small, it is even easier to wrap them in the copper-nickel polyester fabric alongside with the spectrum analyzer antenna to check whether they emit any RF when they are off or in airplane mode with the WiFi and Bluetooth turned off.
What this experiment may allow you to conclude is that the spy chip is not communicating frequently with the external world via radio frequencies, at least not with frequencies <= 6 GHz.
Using frequencies higher 6 GHz for a low-power chip is not going be an effective method of transmitting a signal very far away. The chip could remain hidden and only emit the signal under certain rare conditions, or in response to a trigger. We can’t rule that out with this experiment, but it is unlikely.
A next step would be to test a wired connection. It could be that the spy chip can transmit the data over the internet. One can place a VPN Gateway in between their PC and the router, and use that gateway to route all the traffic to their own server using WireGuard. All network packets that leave through the PC’s ethernet connection can be captured and examined this way using Wireshark or tcpdump.
If one can show that the device is not secretly communicating via RF nor via the internet, I think it is unlikely that the device is spying on them.
The best you can learn is that you didn’t detect communication while you were listening.
Security researchers typically assume that attackers know the systems that will be used against them.
An attacker could evade this trap by waiting to phone home.
Or the hardware could encode information in timing by subtly delaying data leaving the device.
Or it could sneak information out in the pseudorandom data that it uses to set up secure connections.
Or it could use stenography to encode data in your photos.
You are right, if the attacker behaves in these ways, the approaches I described would not catch them. I think that the use of stenography to encode data in photos would be relatively easy to check for if one suspects that this is happening and if the attacker can’t stop it from happening automatically. But I don’t know how one would check for pseudorandom data and identify timing delays, this sounds more difficult to detect.
I can see how these techniques would be useful to extract a specific pieces of information. For example, it be useed to extract username and passwords, encryption and crypto keys, and some files. I am not sure about the extent to which an attacker using these techniques would be able to spy in a more general sense - for example, whether they will manage to stream live webcam video or continuously send activity information. These techniques sound more sophisticated and targeted than what I would expect to see in a “spy chip” integrated into consumer electronics, but I could very well be underestimating the attackers.