Went out with this girl I really liked but brought a friend too just to make it less one on one and more casual. I really liked her and thought it went well. When I drove my friend home, in conversation, he told me I could do better. It was such a stupid destructive thought. All three of us were into the arts. He was into videography, she was photography, and I was painting airbrushed graphics on motorcycles. I dated her for a little while again later and more seriously, but my life was more of a mess then and it didn’t work out. That was one of my biggest mistakes in life; not realizing my lack of emotional depth and letting other’s opinions hold sway or weight. I partition my emotions now. I’m not sure how I feel in the moment. My first reaction is likely worthless, so “I’ll have to get back to you later” - is my usual response. People who whine about how everyone is about to lose their job at work, or tell me how I should feel about others are like giant red flags telling me to avoid them as toxic. Really, in a way I do not lack emotional depth as much as that part of my inner voice speaks quietly and I need to take the time to listen to it carefully. That girl and life lesson are the same thing to me; an abstracted patch, forever holding that part of my personality. When that red flag flies in my head, she is the one waving it; holding me back; telling me to think it through.
While it is outside of the scope of most people’s abilities, the bios is on a flash chip that can be removed, read, and disassembled. I’m no expert here by any stretch. That said, my usual check with software is to simply check for
http
in strings. Even with a binary like a bios ROM, I can pass it through the$ strings
command to look for any addresses. No matter what kind of malicious nonsense the software is doing, it has very low value unless it can dial out.My lack of a complete understanding in this area is why I use a whitelist firewall for most of my devices. It is also the ultimate ad and tracker blocker as I only visit the places I chose to access. I don’t conform to the lowest developer’s ethics and will simply stop using any site or service that fails to be direct and transparent.
The thing is, even most whitelist firewalls are inadequate. They only filter incoming packets. That is really an inadequate model in most cases now, especially with local large language models where it is impossible to verify their capabilities. My reason for all thus bla bla bla is to say, a whitelist on a trusted 3rd party device is a PITA but an effective low barrier way to prevent any bad actor from communicating with the questionable device. It still leaves you open to a potential situation where the device could be sending a packet stream to the outside world over something like UDP.
Otherwise, the main thing I would be concerned with, if it is a UEFI device, are the UEFI secure boot keys. Whomever holds these keys has a lower ring access than the operating system kernel. Anything happening in kernel or user space is effectively under their control.
Anyways, the main way to monitor and check the device is a trusted 3rd party router that blocks any unauthorized connections. This can be challenging to setup with something like OpenWRT. There is a forked OpenWRT device running a version that makes a lot of this easier called PC WRT. That can make a whitelist fw a little easier than sorting out NF Tables and scripting a whitelist firewall.