Readit News logoReadit News
driverdan · 11 years ago
If I wanted to do something like this I'd create open WiFi access points called something like "DeadDrop". They wouldn't be connected to the internet. Instead they'd forward you to a locally hosted site that let you download and upload from local storage.

WiFi has a lot of advantages. You eliminate the risk of USB attacks, physical damage to the device, and the actual location is unknown. The downside is that it would require power.

adventureloop · 11 years ago
The Pirate Box[1] firmware is the perfect thing for this. The problem is finding power to keep the box running, but with wifi, you can hide the box somewhere out of site.

I have always thought it would be cool to set up a piratebox somewhere running from a solar panel. Then in daylight hours the dead drop would be there, but it would be gone at night.

[1]: http://piratebox.cc/

rkda · 11 years ago
There's an Android version in case you have old smartphones lying around. They're more powerful than the OpenWRT routers and they do have their own power. You need to root your phone first though.

http://piratebox.cc/android

Dead Comment

task_queue · 11 years ago
Except it's a beacon that screams "Hey I'm over here" to everyone in a 90m radius.
busterarm · 11 years ago
That's why you set up a few dozen small radios as a neighborhood meshnet.
arbitrage · 11 years ago
Radio direction finding is well known and easily performed. The location may not be immediately obvious, but a knowledgeable person could find it without much difficulty.
martin-adams · 11 years ago
I wonder if you could use Bluetooth Low Energy instead of WiFi as the power saving can last years. iBeacons have the potential to last years on a single battery. Probably not ideal for transferring large amounts of information though.
rcthompson · 11 years ago
You could make the data available elsewhere in encrypted form and use the Bluetooth device to distribute the key and the URL where the data can be found.
admax88q · 11 years ago
The downside is that it has to be powered.
adolph · 11 years ago
I've often wondered about how much power it would take to run a wireless SD card (enough to be solar powered?) and how the software could be extended to allow uploads.

http://www.monoprice.com/Product?c_id=117&cp_id=11709&cs_id=...

See previous commentary: https://news.ycombinator.com/item?id=6195627

driverdan · 11 years ago
That's a pretty interesting idea. It would be easy to power them via solar. I couldn't find power specs for WiFi cards but it seems typical SD cards run on 3.3V up to 300mW, but newer high speed cards can draw up to 3W. A small panel could easily handle that.
p00b · 11 years ago
dr4g0n · 11 years ago
> If you spot a USB flash drive cemented into a wall or kerb, you may have stumbled across a Dead Drop, part of a global art project borrowing tricks from the world of espionage

Or, you might have stumbled across 240VAC wired to a USB connector.

pavel_lishin · 11 years ago
I wonder if that would be worse than carefully crafted malware.
vanderZwan · 11 years ago
Since sharing USB flash drives is pretty much the equivalent of having digital unprotected sex anyway, I'm sure you'll get that soon enough.

And it can get much, much worse than plain old viruses too:

https://www.youtube.com/watch?v=nuruzFqMgIw

will_brown · 11 years ago
The article mentions USB attacks/exploits...but even more dangerous would be child pornography,at least in the US such a crime does not require intent (as automatic as it gets in a criminal context) simply being in possession or even constructive possession would lead to a conviction and a lifetime registration on the sexual offender list.
speakeron · 11 years ago
>The article mentions USB attacks/exploits

I'm not sure that it does. The countermeasures mentioned are for protecting against good old file-based executable exploits. I don't think they even understand the concept of firmware exploits.

speakeron · 11 years ago
Not a good idea. This risks getting owned from the BadUSB exploit.
upofadown · 11 years ago
Since the BadUSB exploit is a MITM for data going through the USB interface, it's existence doesn't increase the risk. All the executable files could just be infected to start with.

It's pretty much the worst idea to execute random files you find in the street anyway so the risk probably isn't that high in the first place.

tach4n · 11 years ago
In the article it's said that's explicitly part of the idea - it's supposed to be dangerous.
onion2k · 11 years ago
It's supposed to appear dangerous. The first time anything actually dangerous happened the user would immediately stop using them. Or worse, they'll end up in prison. Copying a random zip file of the Anarchist's Cookbook on to your PC will get you a few hours of questioning by the police and a caution not to be so stupid as to be a pretend spy again; why you downloaded an archive of several thousand child porn pictures is quite a bit harder to explain away as a bit of fun.
yk · 11 years ago
Is BadUSB possible with any USB stick? ( Or is this only a risk if a modified USB stick was installed in the first place?)
speakeron · 11 years ago
The firmware on a USB peripheral normally isn't write-protected, so it's possible to infect an existing stick.
cplease · 11 years ago
Unlikely and preventable, but I'd be more worried about water and other gack in the connector.
polymathist · 11 years ago
So I found one of these in my city. The Dead Drops homepage has a list of all known locations: https://deaddrops.com/. Took a while to find the exact spot, and when I plugged in... nothing. The drive was completely exposed to the elements without much protection, so it was rusty and as far as I could tell useless. I have a hunch that most of them suffered similar fates.
freehunter · 11 years ago
A more surreptitious spy would have a piece of hardware that can manipulate a USB drive without needing a full laptop. Any small USB host would do, from an old MP3 player to a Sony PSP.
tehmaco · 11 years ago
Something like the Raspberry Pi would probably work well.

It's small, can be powered from a battery pack, you can add some scripts that automount the USB stick and copy everything off (and/or add some things of your own)

ufmace · 11 years ago
As far as small USB hosts, an Android phone with a USB OTG cable would be a pretty nice way to connect to something like this and copy files back and forth. I don't think they're very vulnerable to most of the usual potential nastiness of a malicious USB device.

But no matter what sort of device you're using, it's pretty far from anything an actual spy might use. Any actual spy would want something discrete enough that you could be watched, videotaped, and photographed from multiple angles while making or picking up the drop, and even with endless analysis of the recordings, still have the security service not know that anything happened.

Some of Tom Clancy's books are pretty decent on realistic spy tradecraft, even if they're dicey on other subjects.

6d0debc071 · 11 years ago
If we're talking about general tradecraft, in a how would you do it vein. I suspect a small internet-enabled device set to randomly transmit some time in the next few days or so, that sends OTP encrypted messages to as many people as it can, including the destination, and that self-destructs... releases acid or whatever into the chips... once it's done or if it's tampered with, would be hard to trace back the sender.

Throw it in a bin along with your morning coffee in a place thousands of people go a day - it'll get mixed in with all the other trash in a landfill somewhere and then good luck finding whose trash it went there with....

ekianjo · 11 years ago
An OpenPandora would do even better and recognize sticks in ext formats on top of NTFS and FAT.
MaximillianII · 11 years ago
Tutorial? :)
freehunter · 11 years ago
Well you just need to find a piece of hardware that acts as a USB host. The Raspberry Pi mentioned above would work, but you'd need a keyboard/screen or scripts to do it automatically. With the right hardware (even a rooted Android phone), you would be able to see the USB drive as just more removable storage just like your PC would.

Tutorial:

1) Have hardware that acts as a USB host

2) Work with the files just like you would on your PC

3) That's all there is to it

spiritplumber · 11 years ago
Looks like a pretty good way to break the USB connector off. Wouldn't a short length of wire be better?
Roritharr · 11 years ago
It seems you are already one step ahead of german law enforcement: http://www.express.de/image/view/2015/1/23/29952904,31875408...

m(

(From the german tabloid article: http://www.express.de/koeln/eingemauert-in-einer-fassade-bom... )

fennecfoxen · 11 years ago
Yeah, come on... one of these can be had from about $5 (and they're prime) http://www.amazon.com/s/?field-keywords=usb+extension+cable
hamitron · 11 years ago
I was really into this about a year ago, so I placed one in a brick wall near my apartment. The device probably made it three days before being completely covered in rust.