Build a Ghost Untraceable Laptop: Ultimate Guide to Online Anonymity and Privacy! DIY

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 450

  • @mikesmith9972
    @mikesmith9972 Месяц назад +806

    It's sad that nowadays just wanting to have privacy is somehow seen as doing something wrong. This is nothing you should be ashamed of simply because you have right to be secured in your articles and belongings.
    Great video.

    • @goobabooba1665
      @goobabooba1665 Месяц назад

      Yeah, and use cash only. Unregistered SIM cards, fake IDs, multiple passports with different names🙃. Yeah bro privacy for sure. That’s why Feds are suspicious. Why would you be private if you have nothing to hide mentality.

    • @Promptshot
      @Promptshot 16 дней назад +16

      If you’re goin to this length you are clearly hiding something.

    • @budderman3rd
      @budderman3rd 16 дней назад +75

      ​@@PromptshotSilence FED!

    • @cube22111
      @cube22111 16 дней назад +5

      @@budderman3rd lul he’s not wrong

    • @amoththatthinks
      @amoththatthinks 15 дней назад

      @@cube22111 silence FED

  • @stray8468
    @stray8468 Месяц назад +291

    I think what you are best at is showing the hardware side of cyber security, keep that up, I love the style you have with the glow in the dark, looks really neat.

  • @jacquesredmond
    @jacquesredmond Месяц назад +118

    For those not technically inclined on the hardware side, or those that don't want the hassle of tearing up a laptop, you can do the exact same thing using a THIN CLIENT like the HP T620 or similar thin clients. They don't have a camera or microphone. Obviously not as portable, but the idea is still there, and they only pull 15 watts of power at idle. :)

    • @GhostStrats
      @GhostStrats  Месяц назад +19

      Very good point!

    • @jacquesredmond
      @jacquesredmond Месяц назад +47

      @@GhostStrats Just a suggestion, make a video showing a setup of a thin client, they are dirt cheap on Ebay, RAM is easily upgradable and inexpensive as they usually use SODIMM.
      A second suggestion... for people who aren't hackers, but ARE concerned about privacy, make a video explaining from a "noob" point of view, the differences in stealth OSs, what makes one better than another, how to use TOR safely, again, through the eyes of a new viewer who wants to be safe and anonymous, so it would need to be a step by step tutorial, it might be long or in multiple parts, but it would help a lot of people.
      I have 35 years in IT, I am too tired and in ill health to make videos myself, but it would be great if you ran with it. :)

    • @americanpsyop1364
      @americanpsyop1364 16 дней назад

      @@GhostStrats yours looks alot cooler i bet.

    • @HighVybeTribe
      @HighVybeTribe 4 дня назад +3

      ​@@jacquesredmondYes excellent recommendation I second this 100%🤠👍

  • @Frosty_Q-T
    @Frosty_Q-T Месяц назад +66

    You know the most loved thing about your content is my brother, is your intuitive way of explaining key information. You are helping all of us grow with you, and your hardware engineering is magnificent. Nothing needs to look good it just needs to work, and in some cases be practical. Damn I almost forgot to mention that it’s nice to snip extra wire incase you wanted to setup a remote device for ta… I mean home security. :)

    • @GhostStrats
      @GhostStrats  Месяц назад +4

      lol 😂 thank you very much for those kind words. I really appreciate comments like this thank you!!!

  • @anglerfish61
    @anglerfish61 8 дней назад +51

    well well well, the 15 laptops I have laying around collecting dust are here for a reason

    • @GhostStrats
      @GhostStrats  8 дней назад +3

      YES!!!

    • @anglerfish61
      @anglerfish61 7 дней назад +2

      @@GhostStrats I have a question though. You say nothing is stored on the device but Im guessing this doesnt include hardware unique identifiers like a CPU cause they (im guessing) are stored in the same place where the BIOS is stored? This could technically mean you could be identified still, but it would make it a LOT harder?

  • @santiagovallejo4071
    @santiagovallejo4071 4 дня назад +7

    maybe you are missing something, the bios chip are completely vulnerable, you might have in this project the coreboot technologies in the bios chip programming. there are some another vulnerabilities in certain board modules too. thanks for the video and greetings from argetina

  • @NeverGiveUpYo
    @NeverGiveUpYo Месяц назад +83

    Don't forget about the MAC addresses in the BT/Wifi chipset and similar footprints.

    • @TheTubejunky
      @TheTubejunky Месяц назад +29

      DNS leaks, HARDWARE MACS, WIFI TRIAGULATIONS, and ANY networks that the adapter has ALREADY connected to will be a crumb trail! He's trying hard to sound "TECHY"

    • @dseednorwayn47
      @dseednorwayn47 Месяц назад +10

      He better enabled the MAC spoofing choice in Tails

    • @HellsingGhrey-ht2wg
      @HellsingGhrey-ht2wg Месяц назад +8

      Your Mac address can be changed.

    • @andrew32155
      @andrew32155 21 день назад

      I am concerned that hardware ID's, the permanent MAC or other serialized unique identifiers could still be compromised through low level hardware-layer attacks, or other lower parts of the TCP/IP stack. And just end-run Tails.
      It HAS happened before. And from the perspective of a single individual, even one completely comitted 100% to the pursuit, and with an extremely (unlikely, but playsible) skill level, arguably cannot "know" or contain complete end to end knowledge of security, at all layers.
      Obviously, there's the "best effort" and "good enough" and chasing 100% certainty really means: "Just do nothing and don't even connect online."
      But... if there's any known hardware and chips, or whole devices even that omit uniqe serials & ID's completely that's even better. And ideally the mfg. did it to "be lazy/cheap" rather than "secure/anonymous." Because you can inherently trust that better.
      As I'm thinking of those FBI honeypot ANOM phones, that they deliberately sold as open-source encrypted & secure marketed to criminals. An extreme case & hyperbole, but conveys the idea. Deliberately marketing things to subvert security (theirs) & provide anonymity, is a target for for being compromised at the root. While random "cheap & lazy" omissions of ID & surveillance tech & DRM is at least statistically random.

    • @SilverTester
      @SilverTester 14 дней назад

      ​@@HellsingGhrey-ht2wgspoofed is not the same as "changed".

  • @umop3plsdn
    @umop3plsdn 11 дней назад +11

    should put coreboot for bios replacement too theres backdoors in the bios

  • @runifuceeme406
    @runifuceeme406 16 дней назад +28

    @6:16 DUDE, DONT APOLOGIZE OR MAKE DISCLAIMERS ABOUT PRIVACY.. WE'VE GOTTEN TO THE POINT WHERE GOING THE EXTRA MILE TO ENSURE OUR PRIVACY IS LOOKED AT WITH SCRUTINY LIKE WE'RE UP TO SOMETHING ILLEGAL OR CRIMINAL.. DONT MAKE DISCLAIMERS ABOUT THIS.. TELL PEOPLE TO TAKE THEIR PRIVACY BACK AND BE A STRONG ADVOCATOR FOR PRIVACY RIGHTS..

  • @soul-6323
    @soul-6323 11 дней назад +12

    Didn't get the tracker placed in the CPU as a backdoor for the NSA

  • @javabeanz8549
    @javabeanz8549 3 дня назад +1

    You can usually disable the microphone and camera by unplugging them from the mainboard. You can also buy a cheap WiFi dongle, and use that instead of the internal card. For about $25, you have disposable OS and WiFi.

  • @Satoshic_
    @Satoshic_ 5 дней назад +4

    6:18 "I do not condond **legal** activity " - ahahahhahaha

  • @Uranone1
    @Uranone1 Месяц назад +16

    You can also remove the wifi card and buy a separate one, it looks just like a normal usb drive and costs like 15-20 euros.

    • @GhostStrats
      @GhostStrats  Месяц назад +5

      That’s awesome. Next time I’m gonna have to consider this.

    • @behaviortech1080
      @behaviortech1080 Месяц назад +1

      Okay this answers my question…the wifi card is going to give you your MAC address right? Also wouldn’t you want to spoof your MAC address?

    • @TheTubejunky
      @TheTubejunky Месяц назад +11

      The fact he didn't already know this means he's a noob

    • @djshenanigans731
      @djshenanigans731 Месяц назад

      @@behaviortech1080 Tails has a built-in startup script that does MAC spoofing but I still would not use any piece of tech that has been touched before in some way or ever connected to anything. You would also wanna by the computer with cash and pay someone homeless or unknown to you to pick it up if you are extremely paranoid. You could also NEVER use it on your home network or any locations near where you live as that's one of the first locations to be investigated

    • @dseednorwayn47
      @dseednorwayn47 Месяц назад +10

      @@behaviortech1080 Tails comes with MAC spoofing, so as long he has it enabled he should be fine.

  • @thehackandslashlady
    @thehackandslashlady 13 дней назад +4

    I have my Alienware m17x Laptop from 2008 and I have tails on it. I paid $2,150 when I first bought it.

  • @goat_of_the_net
    @goat_of_the_net 14 дней назад +38

    A camera / microphone can be practical sometimes, what you could do instead is just instead of cutting a wire, you could for example add a switch to the ground of both of theses components, thus separating them from the computer but they can still be used as needed

    • @93vxhybridhatchback
      @93vxhybridhatchback 13 дней назад +14

      I think you missed the point.
      TL;DR: if you need a webcam/mic, this setup isn't for you.

    • @tracesmith3572
      @tracesmith3572 12 дней назад +3

      Point is you don't use your daily driver for this, EVER. If you can't figure out why, pay attention.

    • @earthclad6833
      @earthclad6833 12 дней назад +5

      Bad opsec

    • @93vxhybridhatchback
      @93vxhybridhatchback 12 дней назад +1

      @@papastuffy this went over your head. If you're making a laptop like this, you DO NOT use a mic/webcam with it. You use a mic/webcam with your "normal" laptop. There is absolutely no need for a webcam/mic for this setup. That's how people get jammed up

    • @papastuffy
      @papastuffy 11 дней назад +3

      the negative comments are hilarious. and very wrong. especially the bad opsec one. ummmm, security is in the name. and this is securing the components of the device that are at risk. why remove a tool from your tool box before you go to do a job? it's just overkill to take it out when you can secure it from the rest of the device. would you take the battery out of a car or add some sort of physical SHUT OFF switch between the battery and the motor? hmmm...

  • @stray8468
    @stray8468 Месяц назад +36

    hey man, you're gonna be the next network chuck, keep it up, really love your videos, can't believe you don't get more views

    • @fernandoblazin
      @fernandoblazin Месяц назад +8

      He will have to push sponsored content and sell coffee

    • @drstewart
      @drstewart Месяц назад +4

      Let's hope he can be better, and considerably less cringe with the friggin coffee.

    • @Frosty_Q-T
      @Frosty_Q-T Месяц назад +4

      Network chuck… I swear bros a sham

    • @brandonw1604
      @brandonw1604 Месяц назад

      @@Frosty_Q-T That's the truth

    • @Frosty_Q-T
      @Frosty_Q-T Месяц назад +1

      @@brandonw1604 to be real that jerk says a lot of crap that would in turn actually make you noticed and stick out more when trying to clean

  • @Ночной_Режим
    @Ночной_Режим День назад +1

    Yes and no. But if you’re already taking precautions to stay hidden (such precautions ran off of the drive) then yes. This laptop will not make you invisible however.
    I emphasize. This Laptop Won’t Keep You 100% hidden

  • @mikimouse3001
    @mikimouse3001 13 дней назад +2

    I dont know if youre aware of the Van Eck phreaking which is related to TEMPEST (Telecommunications Electronics Materials Protected from Emanating Spurious Transmissions), where every electronic device that is powered on can by spied upon from a distance using an antenna and special radio receivers revealing whats on the screen of the target. The technique works on pc monitors , old crt tvs, smart tvs(works better), smartphones , SHIELDED usb and hdmi cables (and pretty much any other cable that carries information digital or analogue) and even air gapped machines, and the signal can be received from tens of meters up to hundreds of meters. Scary stuff if you ask me.

  • @twotimer5677
    @twotimer5677 3 дня назад +1

    So wouldn't the boot drive that you use, as a flash drive, be corrupted after so many unplugs? I mean it is a boot drive.. but its also a flash drive so mi sure it'd have safe-unplug on it. I'm just a little concerned about the whole corruptibility for the drive. Also, I was wondering if there isn't anything traceable on the laptop, wouldn't there be a bunch of traceable things on the flash drive? I mean there isn't nothing wrong with resetting the flash drive with a clean install every time but still its not entirely 100% untraceable

  • @PedroKing99
    @PedroKing99 Месяц назад +14

    Only data that is retrievable possible… if storage device is removed but device is not powered down… RAM, if I remember correctly phantom like data can be retrieved from live RAM.
    Other forensic data would obviously be the NIC(s)… this can be worked around by using a usb WiFi or LAN NIC(?)

    • @TheTubejunky
      @TheTubejunky Месяц назад +11

      MAC addresses, wifi network triangulations and RAM YES all snitches on his "GHOTS PC". Not to mention DNS leaks and there are lists of ways to find this device.

    • @PedroKing99
      @PedroKing99 Месяц назад +2

      @@TheTubejunky yes MAC addresses from various nic. You can run a virtual OS containerized with no access to the physical host… this is also helpful .

    • @victorygarden556
      @victorygarden556 22 дня назад

      ⁠@@PedroKing99 what programs would I be looking for to run the siloed container OS? And what do you mean No access to the physical host? 😂 sorry if that’s airheaded I’m not into tech that much, that’s why I thought stripping down laptops to minimize info is the way

  • @JamesSmith-v9n
    @JamesSmith-v9n Месяц назад +3

    Thank you once again for this educational info and once again I love my Tails

  • @Sleepyjamal039
    @Sleepyjamal039 5 дней назад

    I really like it to see your video. I did it before with instructions from other people but if I think like I’m new to this stuff, I would only need this video to do it.

  • @gayshawndayleequeef1946
    @gayshawndayleequeef1946 23 дня назад +16

    The Speakers are also microphones... And you may as well take out the polarizing film so nobody can read your screen without hacker glasses you make.

    • @SilverTester
      @SilverTester 14 дней назад +1

      Excuse me, HOW are the speakers also microphones?? Care to explain?

    • @gayshawndayleequeef1946
      @gayshawndayleequeef1946 14 дней назад +2

      @SilverTester sound waves act against the speakercone which moves the voice coil back n forth through the magnetic field of the speakers permanent magnet which causes a ac current to be induced into the voice coil which which can be translated into audio reproduction of whatever sound was strong enough to move the cone...

    • @SilverTester
      @SilverTester 14 дней назад +2

      @@gayshawndayleequeef1946 that's.. way beyond next level. So there's software that can pick up these shifts and reconstitute voice records? Damn!

    • @umop3plsdn
      @umop3plsdn 11 дней назад +1

      @@SilverTester you can actually use a speaker as a microphone yourself try it sometime

    • @SilverTester
      @SilverTester 11 дней назад

      @@umop3plsdn you say it like its the most normal thing to do in a computer. Maybe mine is retarded, cuz the speakers never show as an option for input. In none of the dozen computers i had over the years. Maybe i should start using my monitor as a webcam.

  • @cb_ah_fb
    @cb_ah_fb Месяц назад +3

    That is an incredibly cool concept. The first thing that came to my mind was the Framework laptops to "natively" support this - just buy the laptop without internal storage and have a couple of storage expansion slots to boot from, with whatever OS you prefer. Any thoughts on that?

    • @GhostStrats
      @GhostStrats  Месяц назад +2

      Thank you very much for telling me this. I’m gonna look into framework laptops. And I don’t seem like a good idea, but the whole idea is if it was to get compromised anyway if you were to leave it somewhere, you don’t want anything that has any data to store at all.
      The concept for this device is more or less a burner laptop. It all for educational purposes only this is an experiment that I wanted to try.

    • @cb_ah_fb
      @cb_ah_fb Месяц назад

      ​@@GhostStrats If you don't know Framework I would suggest you look into them, it's worthwhile just for the concept behind their laptop.
      Basically you get a configurable laptop with 4 USB-C expansion slots where you can plug in whatever you want (there are already pre-made modules from Framework but I saw some custom one made already). The idea was to have one of the storage expansion module be the bootable drive with Tails, Kali or any other OS all self-contained just like in the USB stick used in this experiment, with no other storage at all in the laptop.
      Without that expansion module it would basically be a burner laptop, with the additional benefit of having bigger (this is arguably not a benefit) and faster storage while also being able to also use the laptop as a "normal" laptop, as you can just install Windows (or any other OS you daily drive) in another module and use it when needed.
      TL,DR: you make one module a live OS installation to run just like if it was in a USB stick and another module with a properly installed OS that acts as your daily driver

  • @TekCyber
    @TekCyber 14 дней назад +2

    very cool demo my friend, thank you

  • @Subgunman
    @Subgunman Месяц назад +4

    What about you MAC address? It is always interrogated by websites. How do we reprogram it or block it? Where do we find a secure source of Tails Linux? Knowing about the camera and microphone I have added switches to turn them off but what about the speakers? Theoretically a speaker works like a dynamic microphone but with a different impedance. I could be quite possible for manufacturers to place a circuit within the laptop that would allow the speakers to double as microphones knowing that most secure conscious individuals would disable or remove the microphone. There would not be a way to use the speakers as microphones however if they are playing music at the same time.

  • @moss-ccw7971
    @moss-ccw7971 Месяц назад +1

    I don't need this, but I think it's pretty cool that it can be done,

  • @tubelesstrippin
    @tubelesstrippin 14 дней назад +13

    I'm ready for schizophrenia

  • @beepboop9848
    @beepboop9848 11 дней назад

    There is one issue with this (with tails) where it doesnt flush your V-RAM so whatever is on your screen at the time you eject the USB can possibly be recovered in chunks, so just be aware of that. (unless this is fixed, idk if its outdated but still good to know)

  • @xenoas1er197
    @xenoas1er197 Месяц назад +1

    It's a cool project.
    I'm curious how is that different than just booting up tails from usb stick. I understand the camera being cut but why the hard drive ?

    • @GhostStrats
      @GhostStrats  Месяц назад +1

      So no malicious programs can be ever installed without your knowledge

  • @KarmaReacts99
    @KarmaReacts99 26 дней назад +2

    You are underrated ❤

    • @GhostStrats
      @GhostStrats  25 дней назад +1

      Thank you I really do appreciate stuff like this

    • @KarmaReacts99
      @KarmaReacts99 25 дней назад +1

      @GhostStrats Will wait for Big Videos 📹

  • @DonJane-ng8zl
    @DonJane-ng8zl День назад

    This can be compromised. Just because it deletes everything off the computer in the end because of it saving to ram doesn’t mean anything when you’re putting a memory stick in it that can have malicious software injected into it by operating system vulnerabilities. On top of that it doesn’t protect your IP, Device footprint/fingerprint. Also if the FEDs get your USB welp there ya go. With a compromise memory unit that you said it basically the whole computer. Every time you plug it in to run it can exploit your location

  • @overclucker
    @overclucker 6 дней назад

    Swap out the bt/wifi if you've previously used that machine, or if the source of the machine can be traced back to you i.e. you got it from someone you know, or can identify you.

  • @Brownnoise443
    @Brownnoise443 Месяц назад +2

    Thought I remember reading that there is a very small window of info when you shut down your computer that ram does save a kinda last state type thing, and if you shut off while say looking at an unsavoury page that is burned in and forensics can find that

    • @behaviortech1080
      @behaviortech1080 Месяц назад

      RAM stores credentials short term but no memory to view files if logged in? Or no? Sorry just thinking this out loud as well

  • @adamgarfield9799
    @adamgarfield9799 2 дня назад

    how often do you need to update your tail os image to keep up with browser updates?

  • @yuhhcyan
    @yuhhcyan 6 дней назад

    So other than the microphone, camera, and hard drive, that's all you need to remove, the rest is just untouched? Also, how do you get or make one of those usb chips or drives?

  • @zayne-t9v
    @zayne-t9v День назад

    some things can be saved to either the cpu gpu and even the bios in some cases some advanced viruss can store them selves on those components wich are very tricky to fix so the might be an issue

  • @Enzo_387
    @Enzo_387 13 дней назад

    This is so kool, i had no idea ppl could do things like this, super cool

  • @thegrayjedi5202
    @thegrayjedi5202 День назад

    Bought a real nice older thinkpad off eBay for $45 and it already had the hard drive stripped. I keep it with a tails usb and it runs perfect off that then when I’m done, unplug and there’s NOTHING on that computer to even boot up to.

  • @InterlacedTech
    @InterlacedTech 7 дней назад

    This is great in terms of hardware, but it's not really practical when it comes to some machines. Dell laptops always had unobtrusive mode and kernel level option to disable cam/mic/wwan/other. Some ThinkPads had physical kill switches and some other manufacturers have complete privacy integrations with options. I know bios/UEFI level stuff can have vulnerabilities/backdoors, but there's always a solution for them.

  • @1337haxxor
    @1337haxxor 17 дней назад +1

    Rip the camera and audio out, if you can install libreboot/coreboot on it and install qubes OS as the main os then make sure to follow opsec as you go... Its really sad we have to do this much just to not get seen by a government agency

  • @swortham
    @swortham 3 дня назад

    Love this

  • @shakhwand4158
    @shakhwand4158 23 часа назад

    Hello GhostStrats! I wonder if Tales is so lightweight, cannot it be running on an Android device?

  • @sirius_s2028
    @sirius_s2028 День назад

    What about networking and remembering passwords?

  • @diggyx1773
    @diggyx1773 2 дня назад

    What about the data stored on the USB boot drive?

  • @sarahpursley719
    @sarahpursley719 23 дня назад +2

    So I’m assuming it will wipe internet history too? I’m about to start IT school and I don’t know too much yet.

    • @Reflect744
      @Reflect744 17 дней назад +1

      Good luck mate 😬

    • @sarahpursley719
      @sarahpursley719 17 дней назад

      @ thanks, gulp. 😬

    • @Jagenheie117
      @Jagenheie117 15 дней назад +1

      Tails os is onion no stored internet history to begin with

    • @sarahpursley719
      @sarahpursley719 15 дней назад

      @ nice, thank you for being helpful.

  • @JLoveReacts
    @JLoveReacts 15 дней назад +1

    Could an Apple G4 Powerbook be converted to a ghost laptop? The G4 does not have a webcam and no soldered components to the motherboard, etc.

    • @NilsRatusznik
      @NilsRatusznik 14 дней назад

      You would have to create a 32-bits PowerPC port of Tails, and a one that can accommodate systems with less that 2GB of RAM. Possible in theory because everything is open source, but good luck with that.

  • @hotdogsarepropaganda
    @hotdogsarepropaganda 18 дней назад

    speakers can also be used as microphones. clip the wires, or wire them with a removable headphone jack

  • @karlsnowsill208
    @karlsnowsill208 Месяц назад +24

    Hardware back door in the CPU. IIRC, The most recent Intel CPU not backdoored in this was the Intel Atom series built around 2009-2013. Until you deal with that issue, all you're really doing is down grading a laptop and giving yourself a false sense of security.

    • @GhostStrats
      @GhostStrats  Месяц назад +5

      I disagree. This is supposed to be a burner type laptop where everything that you need is in that flash drive. Almost as if it’s a thin client. Nothing should be stored anywhere. Everything will be operating off temporary memory.

    • @karlsnowsill208
      @karlsnowsill208 29 дней назад +11

      @@GhostStrats
      "Intel Active Management Technology"
      is *hardware and firmware* for remote out-of-band management of select business computers,[1][2] running on the Intel Management Engine, a microprocessor subsystem *not exposed to the user, intended for monitoring*, maintenance, updating, and repairing systems.[1]
      Its on wikipedia.
      You could be monitored in real time from the hardware level without your knowledge.
      becasue you disable the camera and microphone they might not see you face of hear you voice, but a third party could see everything you're doing on that laptop.

    • @jbingbao
      @jbingbao 27 дней назад +6

      Depending on how you type, like how your fingers press each key can also identify you. With the rise of AI companies can do keyboard typing forensic profiles on individuals now. Scary stuff out there…

    • @victorygarden556
      @victorygarden556 22 дня назад +1

      @@karlsnowsill208 can I do this stuff with a raspberry pi to make it easier for a non techie? I just want secure comms

    • @karlsnowsill208
      @karlsnowsill208 22 дня назад +4

      @@victorygarden556 Raspberry Pi has "binary blobs" which is unknown proprietary driver code inside it, so you don't know whats in there, ie not secure.

  • @43johnkramer454
    @43johnkramer454 17 дней назад

    i did the same thing 3 years ago also if you encrypt the main drive you don't have to worry about removing the the ssd or hard drive.

  • @bogdanxyz-bc1fc
    @bogdanxyz-bc1fc Месяц назад +2

    What about intel managment engine, you overlooked it, am i wrong?

    • @BobertV702
      @BobertV702 Месяц назад +1

      You could still opt for a libre booted, luks encrypted thinkpad that has the Intel ME disabled

    • @bogdanxyz-bc1fc
      @bogdanxyz-bc1fc Месяц назад +3

      @@BobertV702 i know thats option, but he is promoting you can do this on any laptop

  • @tomyhill123
    @tomyhill123 16 дней назад

    as i understand it your cpu is traceable through the intel management engine and the system it self can be fingerprinted

  • @RBX-Mys
    @RBX-Mys 8 часов назад

    But can you accuality save anything on one of these SD cards?, Like you do your idk paper work and it stays there even after turning off the laptop or unplugging the drive?

  • @Shopz_Services
    @Shopz_Services Месяц назад +2

    awesome video love the channel

  • @nalixl
    @nalixl 27 дней назад +19

    You've missed a couple of important points. Firstly, you totally can read the ram after removing the usb stick by taking out the memory sticks and cooling them and then reading them in another device. Secondly, there are various techniques to monitor a screen without being actually present nearby. Thirdly, think things might be stored that you don't want in the IME and/or UEFI and/or other possibly existing management systems. And what about buffers, like a keyboard buffer?!!

    • @camzen1772
      @camzen1772 19 дней назад +8

      did you keep pushing your glasses up off your nose after every numeral statement? i can smell the cheetos dust from this comment

    • @banditentertainment917
      @banditentertainment917 18 дней назад +1

      @@camzen1772 wtf is a numeral statement. Just say after every sentence lmao

    • @Reformingandlearning
      @Reformingandlearning 17 дней назад

      Bros right for it can be more secure if taken these in mind

    • @Main-c4q
      @Main-c4q 16 дней назад +1

      Tails has Amnesia, read about it as you're eating your cheetos.

  • @XITIJTHOOL
    @XITIJTHOOL 2 дня назад

    What would happen incase the ram is taken to recover the data ? How long the data lasts in it ? There are forensic software ka on recover operation only.

  • @Aviancorporation
    @Aviancorporation День назад

    May wanna advise against the Stream series. Some have emmc which is soldered on and cannot be easily removed without damaging the computer to an unusable point.

  • @TDAdvocate
    @TDAdvocate 13 дней назад

    Are there USB cards like the one shown that uses micro SD cards? Would love to have yet another layer of security in an absolute worst case scenario.

  • @OnnieKoski
    @OnnieKoski 15 дней назад +1

    what about MAC address obfuscation. is there a wifi card that will allow you to change your MAC address ever time you disconnect or reconnect to a hotspot?

    • @tracesmith3572
      @tracesmith3572 12 дней назад

      That's not the part you have to worry about. It is unencrypted hardware signatures. Your motherboard has an identification which is sent in your handshake packets. Not just about MAC or IP spoofing. You have to spoof EVERYTHING.

  • @TruthBomb4U
    @TruthBomb4U Месяц назад +4

    Would u not rip out the Wifi and bluetooth hardware too like Snowden recommends?

    • @GhostStrats
      @GhostStrats  Месяц назад +1

      If they were easy to detach, maybe but if you’re using an OS like Tails you can have it so it gets network connectivity.

    • @Tim0Tim0
      @Tim0Tim0 Месяц назад +1

      Bluetooth gets people unalived.

    • @TruthBomb4U
      @TruthBomb4U Месяц назад +1

      @@Tim0Tim0 How?

  • @KupriyanovKirill
    @KupriyanovKirill 12 дней назад

    How about replacing WiFi cards in laptop for every use?

  • @Lucabinetti390
    @Lucabinetti390 20 дней назад

    Just earned a follow love your content keep it going !!!

  • @carlosbermeo4028
    @carlosbermeo4028 Месяц назад +3

    Hi but your next video could be about doing a ghost phone or/and a phone that is untraceable smart phone or old phone thanks for it man and you the best

    • @GhostStrats
      @GhostStrats  Месяц назад +3

      I kinda did already check out the Meshtastic stuff

    • @carlosbermeo4028
      @carlosbermeo4028 Месяц назад +1

      @@GhostStrats ok I will check that video out

  • @N3krodamus
    @N3krodamus Месяц назад +2

    What about BIOS reflash? Could it be done in this machine ?

    • @GhostStrats
      @GhostStrats  Месяц назад +1

      It’s probably possible if you were to leave the hard drive in do the flash and then once it’s updated completely remove the hard drive

    • @N3krodamus
      @N3krodamus Месяц назад +1

      @@GhostStrats I was thinking about serial numbers on the BIOS that could been exposed somehow and trace de notebook in some way. Very nice video by the way, cool channel too. Cheers.

    • @GreighThunda
      @GreighThunda 19 дней назад

      Do this on a laptop that supports opencore

  • @nevermindtheclout2970
    @nevermindtheclout2970 28 дней назад +2

    Just a heads up he's Fed with watch the vid carefully if you know you know.

    • @GhostStrats
      @GhostStrats  28 дней назад

      Just spreading awareness and freedom of speech

  • @SxmxOne
    @SxmxOne 5 дней назад +1

    Now show how to change the HWID. I wait. I am not talking about spoofing.

  • @matheusalves799
    @matheusalves799 5 дней назад

    Hi. What is a real world use for a laptop like this?

    • @GhostStrats
      @GhostStrats  5 дней назад

      Just a fun project honestly it was a good learning experience and testing proof of concepts

  • @saenz404
    @saenz404 11 дней назад

    it would be great if you talk about how to make a burner phone

  • @podell111
    @podell111 13 дней назад

    Would it make sense to use the raspberry pie 2W

  • @behaviortech1080
    @behaviortech1080 Месяц назад +1

    Okay. Can we do a video of making sure TailsOS and WiFi aren’t compromised…

    • @GhostStrats
      @GhostStrats  Месяц назад +1

      If I get what you’re saying, all you have to do is turn off persistence when it comes to network storage every time you connect it’ll forget what network you connected to if you set it up that way

  • @notyoursanymore9027
    @notyoursanymore9027 6 дней назад

    I just use vms which i hosted in an external hdd, i have debian based and arch linux vms... You can also do whonix....

  • @goat_of_the_net
    @goat_of_the_net 14 дней назад

    also i guess you could desing maybe with a rpi pico or a arduino nano a simple flash drive that allow for storage but like just with a press of a button it just replace every bit of the drive to nonsense.

  • @NoFilter2024
    @NoFilter2024 Месяц назад +1

    I can do the same thing with Kali as well as Tails?

  • @tonyd9
    @tonyd9 17 дней назад

    Technically it’s possible to freeze information in the ram. I read somewhere that some hacker got busted when he was unable to pull out the flash drive and the feds or whoever froze ram with liquid nitrogen and recovered the info from it later.

  • @savevincent
    @savevincent Месяц назад +2

    Do you need to even have a gpu or cpu? Could it just be a motherboard with ram sticks ? Might be a stupid question.

    • @BobertV702
      @BobertV702 Месяц назад +3

      The cpu is the brain of the laptop, where each instruction is executed. Without it, you wouldn't be able to do anything. The gpu is usually used to draw things on the screen. On laptops, you may have a weak integrated gpu, but that is still required (Because drawing graphics with a CPU is a lot slower, and the CPU would get more load to work on). Mind you, in some CPU cases, like the AMD Threadripper, no integrated gpu is found, which means that you must install a gpu yourself, if you want to see the screen.

    • @GhostStrats
      @GhostStrats  Месяц назад +4

      No question is stupid and thank you Bobert for your comment.

    • @GhostStrats
      @GhostStrats  Месяц назад +3

      Thank you 🙏

    • @TheTubejunky
      @TheTubejunky Месяц назад +4

      You can buy a raspberry pi and boot from a usb. Tails as he says in the video is the go to for these situations. You better learn A LOT prior to doing ANYTHING illegal or you'll have plenty of time day and night in the clink thinking how you got caught!

    • @savevincent
      @savevincent Месяц назад

      I appreciate the detailed comment really helpful! I have an old ryzen 5 5900 with a 580 sitting around ill probably throw that together ​@BobertV702

  • @Sci-Co555
    @Sci-Co555 9 дней назад +4

    dont forget to remove speakers cause they also can be reversed to be used as a microphones :D

  • @mahmoodmirza3301
    @mahmoodmirza3301 Месяц назад

    I'm enlightened!

  • @2500dede
    @2500dede 14 дней назад

    What does the OS on the USB look like after the stick has been ripped off?

  • @louisalakazam738
    @louisalakazam738 11 дней назад

    Does thé hardware can hash backdoor s? Such as in the motherboard and stuff?

  • @DeezelxDr3amz
    @DeezelxDr3amz Месяц назад +4

    mwuahaha awesome stuff brother, stay ghost - stay safe :)

    • @GhostStrats
      @GhostStrats  Месяц назад +2

      Thanks man I appreciate that

  • @IsraelIroegbu
    @IsraelIroegbu 25 дней назад

    wait when you say once the computers turned of nothing saves does that count for apps? sorry if stupid question td found this really intrestin and wanna get into it haha

  • @MyMika2004
    @MyMika2004 8 дней назад

    why use a usb instead of keeping the ssd plate off and removing that?

  • @no-mt6oh
    @no-mt6oh Месяц назад +2

    Can this be done on a Mac Pro? (2011)

    • @djshenanigans731
      @djshenanigans731 Месяц назад +2

      Never use your own previously owned hardware...

    • @_vindicator_
      @_vindicator_ Месяц назад +1

      also macs have a bunch of things soldered on board and u will cause kernel panic if it cant load hardware.

  • @Canthus13
    @Canthus13 11 дней назад +2

    If you're handy enough, you can install a switch on the mic and camera +5v (+3v?) lines.
    Also, I'm not sure if tails fixed this yet, but even after shutdown, memory can be frozen and read using compressed air. So beware that it could hold data in RAM unpowered for a while. Law enforcement knows this and if they're after you for data, a fast shutdown might not save you.

    • @BotchedGod
      @BotchedGod 5 дней назад +1

      needs a battery kill switch and then to hold the regular power button to clear, maybe even eject the cmos just in case

  • @Daodat5656
    @Daodat5656 Месяц назад +25

    dont cut the camera just remove it

    • @joshhardin666
      @joshhardin666 Месяц назад +7

      Or, you know, unplug it and leave it in place.

    • @kattappa4344
      @kattappa4344 Месяц назад +1

      Or just put a black tape?

    • @joshhardin666
      @joshhardin666 Месяц назад +9

      @@kattappa4344 tape doesn't really stop microphones.

    • @Jagenheie117
      @Jagenheie117 15 дней назад +1

      Right like unplug it wire it up to a r pi with a rechargable battery now you have a spy cam

  • @bladeking2013
    @bladeking2013 18 дней назад

    Can u make a mini phone size version plz

  • @dseednorwayn47
    @dseednorwayn47 Месяц назад +3

    Just did the same a few month back from two old lap tops. Runs Tails smooth with 16gb ram.

    • @TheTubejunky
      @TheTubejunky Месяц назад +3

      RAM = SAVES DATA
      so for him to say "EVERYTHING IS GONE WHEN I UNPLUG THIS USB OS" is bs

    • @dseednorwayn47
      @dseednorwayn47 Месяц назад +5

      ​@@TheTubejunkyGenerally if you pull out the usb drive running tails os from the machine, it triggers an immediate secure shutdown. It's meant to be like a ripchord, so as soon as you pull the usb drive it starts wiping the RAM using using sdmem so you will leave no trace. It might corrupt some files on the persistent storage but your data will be safe since the entire ram is overwritten with random data several times to prevent memory dump attacks. Well at least that what they say.

  • @simplecyberdefense
    @simplecyberdefense 24 дня назад

    There are some very rare virus that can infect motherboards (even without a hard drive). Malware planted in the UEFI firmware image is not only difficult to identify but is also extremely persistent as it cannot be removed by reinstalling the operating system or by replacing the storage drive.

  • @smburhan6323
    @smburhan6323 12 дней назад

    I dont know much about this stuff, but i have a question. If you have removed your camera and HDD, but whenever you browse the net wont they be able to find you IP or Mac address? like in mot knowledgeable in this so if you can explain this then thank you.

    • @vehice6210
      @vehice6210 11 дней назад +1

      tails has mac spoofing, use tor for ip. but there are other problems like motherboard

    • @smburhan6323
      @smburhan6323 11 дней назад

      @vehice6210 what about the motherboard?

  • @34qwredsdf435
    @34qwredsdf435 12 дней назад

    amazing video

  • @id104335409
    @id104335409 Месяц назад +2

    Do people ever use their laptop cameras? Are there laptops out there that don't come with a camera or microphone? I know for a fact they dont update their camera hardware every year like crazy like phone manufacturers do. They just slap on the cheapest possible option, but if customers dont care about cameras wouldnt it be even cheaper to just not add any camera??

    • @MrPir84free
      @MrPir84free 28 дней назад

      It costs significantly LESS to have no user selectable options during the sale for any computer; if there is only one configuration, then it's super simple to maintain stock; so most manufacturers include the camera/microphone because many want the option; and it costs more to produce two models - one with and one without webcam/microphone. In bulk, the cheapest webcam/microphone probably costs like 3 to 5 cents total; it'd costs way, way more for the manufacturer to have to stock multiple configurations. My super-cheap N100 laptop comes with a webcam that is so poor of video quality; quality reminds me of cell phone video from the early 2000's.. But it ticks the mark : Included web camera.. My guess is that many folks want a web cam over not, so, even a P.O.S. webcam is good enough; Most that don't want it can simply not use it, or disable it in device manager. The webcam is good enough for work meetings, to give to your kid, or to your grandparents. No user selectable options during sale simply means lower price.. Everyone wants to pay less..
      FWIW: We have bosses at work that want the webcams on during every meeting: Why ? It forces participation; it stops those attending from just muting themselves while they go take a nap, do the dishes, or other tasks if working from home; it also keeps some employees from working other tasks during the meetings; literally discourages doing other stuff than participating in the meeting...

  • @TechnoMinded-qp5in
    @TechnoMinded-qp5in 20 дней назад

    Just use Linux and a privacy focused browser and you should be just as fine hope this helps.

    • @xNullst
      @xNullst 18 дней назад

      the video is for people like who want a privacy device that actually is fully private and not has any kind of data from you every time you use reuse it
      Qubes os would be the best choice for normal people that want mostly the same privacy just without completely ripping the laptop apart

  • @MaigVigo
    @MaigVigo 7 дней назад

    what about the NIC????

  • @NinjaThorn
    @NinjaThorn Месяц назад +21

    This is totally overkill. Just use tails. It doesn't store anything to the hard drive anyway. But hey I guess if you wanna do this go nuts.

    • @_vindicator_
      @_vindicator_ Месяц назад +1

      what if i wanna plug in windows to go. or what if tails boots and ur auto enable camera is compromised with a webp attack.

    • @tracesmith3572
      @tracesmith3572 12 дней назад

      Wrong. Hardware identifies itself when it communicated to other hardware. Anybody running an illicit exit node has yer ass.

    • @_vindicator_
      @_vindicator_ 12 дней назад

      @@tracesmith3572 you mean they get their mac address? that's nothing. it's not something you can identify or trace. it's only relevant if you have a sample list to compare to.

    • @HighVybeTribe
      @HighVybeTribe 4 дня назад

      Can you explain to a newbie what tails is please 🙏

    • @_vindicator_
      @_vindicator_ 4 дня назад

      @HighVybeTribe its a pendrive installed portable linux distro

  • @KillTheFear
    @KillTheFear 15 дней назад

    But ram can no be recovered. Does it wipe the RAM?

  • @anomalydheryn5492
    @anomalydheryn5492 9 дней назад

    Bro, you've just bring back that little spark of hacking again to me.. Thanks❤

  • @behaviortech1080
    @behaviortech1080 Месяц назад +2

    Newbie here: But the MAC address isn’t stored in the hardrive or is it?

    • @GhostStrats
      @GhostStrats  Месяц назад

      The MAC address (Media Access Control address) is stored in the hardware of a network interface controller (NIC), typically in the firmware of the device.
      But you can manipulate and change that too. It’s not that hard.
      Here are some programs and tools that can help you change or spoof your MAC address:
      Technitium MAC Address Changer: A user-friendly tool for Windows that allows you to easily change your MAC address.
      MAC Address Changer: A lightweight program for Windows that provides a simple interface for MAC address modification.
      Linux Command Line: You can use commands like ifconfig or ip link set to change your MAC address on Linux systems.
      macchanger: A command-line utility specifically designed for changing MAC addresses on Linux.
      Spoof MAC Address (Android): An app that allows MAC address spoofing on rooted Android devices.
      ⚠️Always use these tools responsibly and in accordance with the law.⚠️

    • @TheTubejunky
      @TheTubejunky Месяц назад

      It's hardware MAC is on the WIFI chip installed in that laptop. You can buy and use other chipsets/USB adapters like Alpha brand but one and done use if your being a bad boy! Don't think it can't be traced because it can. one use and toss unless your already a glowie.

    • @TheTubejunky
      @TheTubejunky Месяц назад +1

      @@GhostStrats YOU CANNOT change the HARDWARE MAC ADDRESS! You can SPOOF it for networks but NOT CHANGE the HARDWARE MAC. You should know this.

    • @djshenanigans731
      @djshenanigans731 Месяц назад

      @@GhostStrats TailsOS has a built-in startup script that spoofs the MAC but like thetubejunky said, you can't cahnge the "burned in" address from the manufacturer and if that is found out and you used your bank card or CC to buy that computer, you just got burned

    • @behaviortech1080
      @behaviortech1080 Месяц назад

      @@TheTubejunky thank you for the response

  • @DJ29Joesph
    @DJ29Joesph Месяц назад

    Where can you get the incognito CC size usb drive

  • @15743_Hertz
    @15743_Hertz Месяц назад

    What about the TPM?

  • @whenincourseofhumane
    @whenincourseofhumane 6 дней назад

    What about buying a laptop from a pawn shop and wiping it clean?