[spam][crazy][log] airgappedness log again
I'd like to put my age encryption key on an airgapped device. Soemthing I've pursued a lot. I'd like to remove the radios from an unopened phone to do this. I have a phone to practice with. I'm not sure where I'm at with it: I think I started, trying hard, and then stopped, maybe due to how hard it was. It seems easiest to remove the radios by raising the phone temperature gently in a toaster oven. I wonder if those are available cheaply, in case the oven is made unsafe for eating in the process.
ouch the cheapest toaster oven on amazon is like $90. i expected there to be some cheap variant for like 20$ that broke after 4 uses. i have a heat gun but it doesn't get hot enough to desolder the high-temp solder used on the shielding on this phone. similarly, my soldering iron has a similar issue. the biggest issue is my hands don't stay reliably, so things that take fine work are pretty hard for me now. here's one for $25: https://www.ebay.com/itm/393879850870 i'll call it an investment in therapy. unfortunately it's the last one :( but the model is likely sold elsewhere, and there are other listings on the site.
bought it. note: I also explored using a dremel to cut through the shielding here. that looks like it would work but also takes fine placement. the biggest issue is that it spews tiny shards of metal everywhere in the process of cutting, and is very loud. i'm a guest in this indoors environment, and i saw a movie about birds dieing horribly en masse from eating tiny shards of metal thinking they were sand for their gizzard, so i get more confused when i consider doing it outdoors. there's likely an easy solution, some way to catch the spray of metal shards to safely dispose of them.
The toaster's estimated delivery date is Feb 11. I'll likely have forgotten about it by that date, and have developed new inhibition around engaging it. To repeat, the age signature scheme I posted is totally bogus and provides no cryptographic guarantees at all. A better one could likely be derived somehow. Meanwhile, there are many other things, like pgp, minisgn, nacl. In order to send and receive cryptographic messages, you need a device that isn't monitored by scads of unidentified third parties.
participants (1)
-
Undiscussed Horrific Abuse, One Victim & Survivor of