Coding for Security

Discussion in 'MacBook Pro' started by ghanderman, Apr 20, 2013.

  1. ghanderman, Apr 20, 2013
    Last edited: Apr 20, 2013

    ghanderman macrumors newbie

    Joined:
    Apr 17, 2013
    #1
    i have a question:

    say i wanted to build a global monitoring system using devices that consumers purchase themselves (TVs, computers, cell phones, digital cameras, printers, fax machines, answering machines, telephones, etc. anything with a wired or wireless capability)....and say i wanted to set up a central command someplace in the us or where ever with a bank of computers each that has the capacity to link into any device any time as long as that device had wireless capabilities, regardless if the user checks connect to wifi box or not.

    so basically, a program to hack into user devices using legitimate "updates" and versions as a means by which to download programs and upload the activity for any given device on a regular and non-red-flag-raising way....but a program that could piggyback itself on source code in a hidden directory of secondary source code (a surveillance trojan i suppose) that deployed itself throughout the user's machine without the user being able to detect it even if they looked for it because the directory was a hidden one that could not be accessed via sudo/root commands because it was under an entirely different set of privileges and permissions. the user could not even do a show hidden files cmd because the parallel directory was written to be latent and invisible and operate piggy backing on other legitimate processes and applications.

    but more, to write a program that allowed anyone surveilling your machine to have remote access to not only look through the contents of your machine, but to turn apps on without your knowing, like the remote desktop and remote management apps, like java virtual machine and vnc....like isight and audio functions....theoretically, there are enough configurations in linux unix bsd osx etc to potentially write the right kind of source code to exploit and manage something like this, right?

    so it would be a dual system with a top layer of functionality that is in the user's control...and a bottom layer of functionality that the user does not even know about.

    is it possible to write a program to do something like this? how long would it take? what kinds of bugs or problems might be anticipated?

    this is assuming that the manufacturers of the devices are aware of this and have built the devices to specifics that optimize this sort of thing. say they've entered into a security contract with a client who wants to monitor a population 24/7 without the population knowing and without spending any more money than is necessary to get it up and running.

    :confused:
     
  2. AppleMacFinder macrumors 6502a

    AppleMacFinder

    Joined:
    Dec 7, 2009
    #2
    Of course, such a program is possible to create!
    If you are able to produce a clear algorithm,
    then this algorithm could be converted to a program.

    Moreover, I think such programs are already exist.
    Take a time to review the existing solutions,
    and it would be more easier to accomplish the task,
    perhaps you would even find some useful source code ;)
     
  3. ghanderman thread starter macrumors newbie

    Joined:
    Apr 17, 2013
    #3
    well, right now i am working on the theory of it...im actually writing a short story with quantum intelligence as the basic premise...like AI but smarter, faster, better, and with the capacity to be independently creative, ie write or rewrite its own source code on the spot when confronted with a problem. in other words, it takes the place of the user/hacker. it has all the accuracy and preciseness of an algorithm but all the flexibility and imagination of a human brain. how to write an algorithm that could emulate a human mind's functioning is the question...anyways, yes i think that source code is already out there and been written as well as is being written! but it seems to me that such a project would be utterly time consuming and require massive resources and coders working many many hours for it to be fully functional....also, you would have to make the machines like laptops with more memory than advertised so that you could hide a partitioned area solely for the program.




     

Share This Page