• Spy tools found in N Korea software
    22 replies, posted
[url]http://www.bbc.co.uk/news/world-asia-35188570#sa-ns_mchannel=rss&ns_source=PublicRSS20-sa[/url]
What, North Korea spies on its own citizens? Never. :v: Kinda hilarious it's a shitty OS full of spyware, though.
This is absolutely deplorable, and I am quite frankly shocked that this is even legal. I expected better from North Korea.
Was it a magnifying glass and a hammer inside the tower?
90% of their search history - "How to anonymously browse the web"
[QUOTE=AverageTyler;49412334]90% of their search history - "How to anonymously browse the web"[/QUOTE] "Why did Supreme Leader Kim eat all my food?"
[QUOTE=l337k1ll4;49413968]"Why did Supreme Leader Kim eat all my food?"[/QUOTE] And furry porn
in other news the sky is blue
Yeah RedStar's invasiveness isn't anything new. Pretty sure its been known to track and report offline files for awhile now. IIRC it also scans drives (USB and ext-HDs) for files not stored internally and tracks those as well
I found a site with ISOs for this OS. Are there any legal things in the US that prevent tinkering? Obviously I'd make this boot from a VM with no network connectivity...
[QUOTE=l337k1ll4;49413968]"Why did Supreme Leader Kim eat all my food?"[/QUOTE] Silly North Korean, you never had any
[QUOTE=agentfazexx;49414610]I found a site with ISOs for this OS. Are there any legal things in the US that prevent tinkering? Obviously I'd make this boot from a VM with no network connectivity...[/QUOTE] Since RedStar runs off an intranet I doubt anyone would know you had it or used it outside of the logs of you downloading the ISO itself
[QUOTE=WitheredGryphon;49414820]Since RedStar runs off an intranet I doubt anyone would know you had it or used it outside of the logs of you downloading the ISO itself[/QUOTE] Well at first use until I determine what it's talking to, I'd prefer to have its NIC disconnected. Never know if in the US it connects to whatever network it can talk to, at least based on all the stupid spyware that's on it. How does it run off an intranet? Just have static routes to Nork networks and blocks everything else or something?
[QUOTE=agentfazexx;49414835]Well at first use until I determine what it's talking to, I'd prefer to have its NIC disconnected. Never know if in the US it connects to whatever network it can talk to, at least based on all the stupid spyware that's on it. How does it run off an intranet? Just have static routes to Nork networks and blocks everything else or something?[/QUOTE] North Korea has a filtered intranet that Red Star connects to. AFAIK web content is taken, inspected, and if approved then added to the country's intranet. The intranet itself is called Kwangmyong and works by using an internal search engine. It also has its own DNS system so it can host domains not accesible via extranet.
[QUOTE=WitheredGryphon;49415163]North Korea has a filtered intranet that Red Star connects to. AFAIK web content is taken, inspected, and if approved then added to the country's intranet. The intranet itself is called Kwangmyong and works by using an internal search engine. It also has its own DNS system so it can host domains not accesible via extranet.[/QUOTE] So basically even on my own network it can't talk to anything but itself here? I'm fully aware of the Nork intranet.
[QUOTE=Daniel Smith;49411849]I expected better from North Korea.[/QUOTE] come on
[QUOTE=agentfazexx;49415174]So basically even on my own network it can't talk to anything but itself here? I'm fully aware of the Nork intranet.[/QUOTE] My bad im at work and missed the NORK acronym. But afaik yeah it cant communicate with anything outside of North Korea. Getting wireshark or some similar monitoring program running would probably be the safest bet just to be sure it isnt calling back to some outside servers.
[QUOTE=WitheredGryphon;49415598]My bad im at work and missed the NORK acronym. But afaik yeah it cant communicate with anything outside of North Korea. Getting wireshark or some similar monitoring program running would probably be the safest bet just to be sure it isnt calling back to some outside servers.[/QUOTE] Are US ISP's even able to communicate with North Korea? I'd think that would be blocked since technically we are still at war, at least legally.
[QUOTE=agentfazexx;49415660]Are US ISP's even able to communicate with North Korea? I'd think that would be blocked since technically we are still at war, at least legally.[/QUOTE] Awhile back, at least if I read right, the NSA managed to also breach their intranet with the help from South Korea. I don't think its possible for any ISP to reach North Korean hosted websites though, just because their websites use their own dns system and are hosted on their intranet. There's a few government-related ones hosted on the ".kp" domain that are accessible from the extranet though
[QUOTE=WitheredGryphon;49415773]Awhile back, at least if I read right, the NSA managed to also breach their intranet with the help from South Korea. I don't think its possible for any ISP to reach North Korean hosted websites though, just because their websites use their own dns system and are hosted on their intranet. There's a few government-related ones hosted on the ".kp" domain that are accessible from the extranet though[/QUOTE] I know they have like 1000ish public IPs...which have been scanned. I've scanned them myself but I think they got keen to what was published so they did more "security stuff" to patch their vulnerabilities. I still am curious what can be done to fuck with them.
[QUOTE=agentfazexx;49414610]I found a site with ISOs for this OS. Are there any legal things in the US that prevent tinkering? Obviously I'd make this boot from a VM with no network connectivity...[/QUOTE] Actually think of the possibilities if it sends data back to a database in North Korea, corrupt that shizzle with [I]so much porn[/I] that it'll break headlines when "the great leader" sees and rages
Sorry, you need to Log In to post a reply to this thread.