pull down to refresh

Follow up article on micro cameras on drones (#1278178). Some points to mitigate this risk:
The micro-drone threat boils down to unauthorized visual or audio capture of sensitive info. CCSS counters this head-on:
Offline and shielded processes (from Key Generation and Storage) keep seeds away from cameras—think air-gapped computers or Faraday enclosures.
Multi-sig and distributed storage (Wallet Creation and Key Storage) ensure no single exposure compromises everything.
Trusted environments and MFA (Key Usage) minimize on-screen displays or inputs that drones could photograph.
Audits and logs (Operations domain) help detect and respond to surveillance attempts, turning potential breaches into learning opportunities.
Overall, higher levels add layers like tamper-evidence and third-party validations, making it exponentially harder for tiny spies to succeed.
71 sats \ 3 replies \ @Wumbo 10 Nov
An additional simple step is to put a bed sheet or poncho over your head and work area.
To make it hard for micro drones to see.
reply
Yes! I remember this from the movie they made about Snowden.
reply
42 sats \ 1 reply \ @Wumbo 11 Nov
I don't know if you are referring to the movie or the documentary
If you have not see the documentary, then I highly recommended it. It was filmed while Snowden was in Hong Kong on the run.
reply
I haven't seen the documentary. It was in the movie where the journalists meet him in a hotel room in HK. He puts the blanket over himself while he enters the password to his computer.
reply