Bandwidth limit for hacker prevention

  • Thread starter Thread starter hilbert2
  • Start date Start date
  • Tags Tags
    Bandwidth Limit
AI Thread Summary
The Linux terminal command 'tc' is utilized for managing bandwidth, specifically for limiting download and upload speeds. When the command is executed, it effectively slows down upload speeds significantly, which could theoretically hinder a hacker's ability to exfiltrate data in real-time from a compromised device. However, this method is not foolproof against serious cyber threats, as attackers typically target sensitive information like credit card details and passwords, which are small in size and can be quickly transmitted regardless of bandwidth limitations. The discussion suggests that while limiting upload speed may deter casual intrusions, it is unlikely to stop determined hackers who may employ methods such as keystroke logging. Additionally, there is a concept proposed for a Java GUI application that would allow users to adjust bandwidth parameters easily and conduct speed tests to optimize settings. For sensitive data storage, using a password manager is recommended for better security.
hilbert2
Science Advisor
Insights Author
Messages
1,600
Reaction score
607
TL;DR Summary
About limiting the net download and upload speeds in a Linux system to prevent fast download of data from your computer by hackers.
A few days ago, I noticed that there is a Linux terminal command 'tc', which can be used for limiting the download and especially upload speeds of your internet connection. When I write

Code:
sudo tc qdisc add dev eth0 root tbf rate 100kbit latency 10ms burst 1540

in the terminal, the download speed remains good enough for browsing websites, but the upload speed gets really slow, like an early 1990s modem connection. The 'eth0' in that command is the name of the connection. As far as I know, this is used by server administrators for limiting the bandwidth consumed by a single user. However, shouldn't this also prevent a hacker getting real time data from your computer's microphone and webcam in the case they get around your firewall? The upload speed after applying that setting should be way too slow for that. I can't find any information about anyone using this for that purpose, but it should be difficult to circumvent if the intruder doesn't know what's causing the slow connection.

It should be easy to make a Java GUI application where you can select the percentages to which you want to drop the download and upload speeds from the original values. Then it could do several connection speed tests with different values of 'rate', 'latency' and 'burst' parameters and find the correct ones to get the data transfer rates to what you're after.

The tc command is also introduced in this wiki page:

https://wiki.archlinux.org/index.php/advanced_traffic_control
 
Computer science news on Phys.org
Microphone & Video in real time is more of a "for a laugh" hack than anything else. Serious criminals won't be interested in that, they want things like credit card data / security keys / password data...the type of stuff which can have a real impact on your "real" life and this type of data is tiny so limiting your bandwidth won't help with that.
 
MikeeMiracle said:
Microphone & Video in real time is more of a "for a laugh" hack than anything else. Serious criminals won't be interested in that, they want things like credit card data / security keys / password data...the type of stuff which can have a real impact on your "real" life and this type of data is tiny so limiting your bandwidth won't help with that.

Yeah, I thought so, as well. That made me think of a way to process files in a way opposite to a ZIP or RAR compression, adding a lot of "filler" data that all has to be read before the actual useful content can be extracted from it. If the credit card data and similar were kept in that kind of files, then limiting the upload speed would protect them. However, I think a hacker would be more likely to record the keystrokes you make on your computer and try to find passwords and credit card numbers from that data.

Politicians and celebrities would possibly be more concerned about someone recording their conversations through the microphone of a hacked laptop or phone.
 
If you need to keep important stuff like credit card data on your computer then consider storing it in Password Manager software like Keypass.
 
In my discussions elsewhere, I've noticed a lot of disagreement regarding AI. A question that comes up is, "Is AI hype?" Unfortunately, when this question is asked, the one asking, as far as I can tell, may mean one of three things which can lead to lots of confusion. I'll list them out now for clarity. 1. Can AI do everything a human can do and how close are we to that? 2. Are corporations and governments using the promise of AI to gain more power for themselves? 3. Are AI and transhumans...
Thread 'ChatGPT Examples, Good and Bad'
I've been experimenting with ChatGPT. Some results are good, some very very bad. I think examples can help expose the properties of this AI. Maybe you can post some of your favorite examples and tell us what they reveal about the properties of this AI. (I had problems with copy/paste of text and formatting, so I'm posting my examples as screen shots. That is a promising start. :smile: But then I provided values V=1, R1=1, R2=2, R3=3 and asked for the value of I. At first, it said...
Back
Top