thanks for the link , it contains many useful information about anonymity.
Also thanks for the x86 paper.
From the advanced targeting techniques, exfiltration of air-gapped computer,
may happen through:
- light variation in backlit keyboard, HD LEDs, display brightness,
- FAN noises, ultrasonic soundwaves, vibrations,
- electromagnetic interferences, electromagnetic emissions, magnetic waves
- GSM frequencies,
- turning RAM into wifi emitter,
- power lines
from the link above, these advanced targeting techniques, requires malware, to infect the air-gapped laptop first, before then it can perform exfiltration. but, my old laptop was never connected to the internet, because its Linux version, since its installation, is not compatible, with the wifi card, also I had already unplugged the wifi card. therefore, since there is no way, for malware to infect, then it looks like, the techniques being used, are not any of these advanced techniques.
also from the x86 paper, and the link above, i think other gap possibilities, that maybe being used are, bluetooth and ultrasonic soundwaves,
hmm, but i wonder, why the link above, doesn’t mention, whether intel ME or AMD PSP have independent internet access, or maybe i missed something, anyone have link or paper, that mention, whether x86 architecture has independent internet access ?
because the independent internet access, described here, doesn’t mention whether it requires wifi card or not.