Discussion
Loading...

Post

Log in
  • Sign up
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Matt Organ
Matt Organ
@Slater450413@infosec.exchange  ·  activity timestamp 2 weeks ago

A friendly reminder to never trust manufacturers privacy protections.

I was recently attempting to get an external camera functioning, so I started polling various video devices sequentially to find out where it appeared and stumbled across a previously unknown (to me at least) camera device, right next to the regular camera that is not affected by the intentional privacy flap or "camera active" LED that comes built in.

I had always assumed this was just a light sensor and didn't think any further about it.

The bandwidth seems to drop dramatically when the other camera is activated by opening the privacy flap, causing more flickering.
This was visible IRL and wasn't just an artifact of recording it on my phone.
I deliberately put my finger over each camera one at a time to confirm the sources being projected.

A friend of mine suggested this may be related to Windows Hello functionality at a guess but still seems weird to not be affected by the privacy flap when its clearly capable of recording video.

dmidecode tells me this is a LENOVO Yoga 9 2-in-1 14ILL10 (P/N:83LC)

Command I used for anyone to replicate the finding. (I was on bog standard Kali, but I'm sure you'll figure out your device names if they change under other distros):
vlc v4l2:///dev/video0 -vv --v4l2-width=320 --v4l2-height=240 & vlc v4l2:///dev/video2 -vv --v4l2-width=320 --v4l2-height=240

#Cyber #Security #Infosec #Lenovo #Privacy #Hacking

Your browser does not support the video tag.
GIF
GIF
Open
GIF
  • Copy link
  • Flag this post
  • Block
Matt Organ
Matt Organ
@Slater450413@infosec.exchange replied  ·  activity timestamp 2 weeks ago

Well that was an unexpected twist.
Dammit Physics!

I decided to put some regular black electrical tape over the camera to block it whilst keeping a neat finish. Turns out IR passes straight through electrical tape 😂

I did consider whether its because of the adjacent backlight and so I tried blocking that too, however most of the rooms I sit in have enough ambient IR to not matter.

I'm considering something more "glass like" since that seems to reflect IR much better but the seems a pain.
Anyone else have a better solution they've found?

Its probably at the point for me that its "good to know but can't be bothered" but there's just so many interesting and unexpected outcomes I felt compelled to satisfy my curiosity and share.

#Cyber #Security #Infosec #Lenovo #Privacy #Hacking

Picture of IR camera seeing through the electrical tape with reasonable detail.
Picture of IR camera seeing through the electrical tape with reasonable detail.
Picture of IR camera seeing through the electrical tape with reasonable detail.
  • Copy link
  • Flag this comment
  • Block
Matt Organ
Matt Organ
@Slater450413@infosec.exchange replied  ·  activity timestamp 2 weeks ago

A few people have pointed out the security separation being a point of difference in Windows but I do wonder if that actually exists or if is it just assumed?

The hardware itself just presents as a regular camera with a regular generic driver, nothing special about it.

The login screen context is certainly segregated context (has been Win2k, I think) but does anyone elevate to enroll their face under their own user context?

I've never used Windows Hello, so my knowledge is quite dated but I don't belive fingerprint scanners do, which would be a similar mechanism where an abstract identity token from an arbitrary hardware device is created and stored without the need to elevate. Presumably you still need to authenticate to prove "you are you" when enrolling new methods but just no privilege escalation to use the hardware device for the capture itself.

  • Copy link
  • Flag this comment
  • Block
Matt Organ
Matt Organ
@Slater450413@infosec.exchange replied  ·  activity timestamp 2 weeks ago

@jik Yeah, does look to be IR based on the output. It just seems very unusual to provide the illusion of privacy with hardware right next to it.

I haven't got a Windows version to test with but it equally there's a lot of privileged software that would be able to get to it just fine. From the legitimate sources, I doubt there's much specific logging if your SOC decided to bring it up remotely (nothing in directly in Elastic, Helix or Sophos comes to mind... Maybe Sysmon output).

From the not so legitimate sources, LPE on windows is not treated particularly critically and are pretty common. eventvwr and razor keyboard driver installers both had longstanding "easy wins", to mention the myriad of opportunistic dll highjacking.

The solution for all that would be for the privacy switch to actually just work as one would expect it too, even if it inconveniences windows hello.

  • Copy link
  • Flag this comment
  • Block

Bonfire social

This is a bonfire demo instance for testing purposes

Bonfire social: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.1 no JS en
Automatic federation enabled
Log in Create account
  • Explore
  • About
  • Members
  • Code of Conduct