Now Reading
Detonate the transparency grenade to instantly collect and leak sensitive data

Detonate the transparency grenade to instantly collect and leak sensitive data

The transparency grenade is going to blow you away

If you thought Wikileaks was a disruptive idea, the transparency grenade is going to blow you away.

This tiny bit of hardware hidden under the shell shaped like a classic Soviet F1 hand grenade allows you to leak information from anywhere just by pulling a pin. The device is essentially a small computer with a powerful wireless antenna and a microphone. Following detonation, the grenade intercepts local network traffic and captures audio data, then makes the information immediately available online.

The data obtained at the site of detonation streamed anonymously streamed to a dedicated server where it is mined for bits of emails, HTML code, images and audio material. These are then neatly presented in the form of a feed that can be accessed when clicking on the red dot highlighting the place of the leakage on a map available online. The ease of use and the mobility of this solution could make the transparency grenade a very powerful weapon in the hands of a concerned citizen or disgruntled civil servant.

Although designed by Julian Oliver for an arts exhibition, the grenade is much more than a concept. It is very much real and tangible. While the translucent shell has been 3D printed from highly resistant resin, the triggering mechanism and all other metal parts have been carefully handcrafted from silver by Susanne Stauch.

The hardware components include a Gumstix computer fitted with an ARM Cortex-A8 processor and running a modified Angstrom OS. An Arduino Nano platform is used to handle the embedded display, and the spy work is handled by a powerful 802.11 antenna and a 5 mm microphone. The collected data is stored on an 8GB MicroSD card. A 3.7 volt battery powers the whole rig, including a 64 x 32 pixel LCD display and a LED Bargraph to show the wireless signal level.

See Also

Read more . . .
 
Bookmark this page for “leak sensitive data” and check back regularly as these articles update on a very frequent basis. The view is set to “news”. Try clicking on “video” and “2” for more articles.

What's Your Reaction?
Don't Like it!
0
I Like it!
0
View Comments (0)

Leave a Reply

Your email address will not be published.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll To Top