Does enabling hardware acceleration increase the attack surface of software?

For software that process untrusted data and have an option to use hardware acceleration, does enabling hardware acceleration increase the attack surface of the software? Examples of situations where typical software process untrusted data… Continue reading Does enabling hardware acceleration increase the attack surface of software?

Do car Bluetooth FM transmitters allow others to eavesdrop on the hands-free phone calls that I make?

My car’s entertainment system is only able to play audio CDs and receive AM/FM radio. I am thinking of getting a Bluetooth FM transmitter so that I could use my car’s speakers to play my smartphone’s music and make hands-free calls.
It is … Continue reading Do car Bluetooth FM transmitters allow others to eavesdrop on the hands-free phone calls that I make?

Can my ISP know that I am using Tor if I am connecting to Tor via an SSH SOCKS5 proxy?

I created an SSH SOCKS tunnel that forwards connections from a local port to a remote server: ssh -N -D 127.0.0.1:1234 me@example.com (i.e. all connections to 127.0.0.1:1234 get forwarded to the example.com server). I then configured the T… Continue reading Can my ISP know that I am using Tor if I am connecting to Tor via an SSH SOCKS5 proxy?