On 03/02/2021 03.16, gumb wrote:
This is pretty much off-topic though it does potentially talk about an openSUSE-based PC at two ends of a connection. Just a quick, basic layman's response is all I'm looking for. Please, if this thread gets more than 10 posts long and delves into anecdotes about systems deployed in army conflicts in the 1970s, please delete it.
:-D
Full paranoia tin-foil hat mode on: If, theoretically, a PC running openSUSE in one location, is communicating via encrypted video calls or SSH across the Internet, with another openSUSE PC in another location, and then the connection at one location (staffed by tech-averse personnel) mysteriously goes down, the provider then sends out an engineer who unexpectedly suggests that wiring behind the wall socket is 'draining the power', and proceeds to do some unknown work to the cabling that may hypothetically involve the covert placement of a bugging device on the line... breathe out, stay with me...
You are not talking of the power, electricity mains, socket?
Does that potentially compromise any secure connection, be it SSH, encrypted voice/video call etc. that is established between these computers, or does the encryption (provided it's strong enough) make it impossible to intercept with a physical device on the line? I'd have presumed the latter, because it's no different to trying to hack it from anywhere else, but I might be overlooking a technicality. To clarify, the PC connects to a router that is wired to a wall box serving as an 'entry point' of the connection into the property. Any such bugging device would therefore be placed between the router and the outbound cabling onto the street.
Assuming they did not touch the computer itself, the quick answer is "no". This is the type of attack that encryption is designed to defend you from. However, video/audio: not all protocols are sufficiently secure. Some do not encrypt at all, others the encryption is managed by the provider of the conferencing service, so you you have to trust them... however, these people do not need access to the socket: they already have silent, transparent access. -- Cheers / Saludos, Carlos E. R. (from 15.2 x86_64 at Telcontar)