Discussion in 'privacy general' started by Minimalist, Apr 20, 2015.
LOL!! I am sitting in a private home with what I believe is a locked down computer laptop. My CAM and Mic's are covered with tape, so I understand being proactive.
Tape - a best security tool for laptop camera. I have camera on my work laptop covered also.
Same here. Finally was able to use my lost EFF stickers for this particular task.
You guys make me feel sane. Same here.
My five year old laptop which is the main laptop I use doesn't even have a camera, so no issues for me
Also, my old HEL80 has a sliding cover over the webcam, which you manually slide to uncover the webcam when you want to use it, and than then slide back to cover it when you are done.
However, due to me being trusting and not even the slightest bit paranioid, on computers with an uncovered webcams, I actually don't cover them.
For those that are concerend about unauthorised use of their webcams, I just found a website which sells webcam covers.
When I got my custom desktop in 2007, I specifically ensured that I would have no camera and microphone. Can't be too careful!
Yeah I made it a point to elect not to have a webcam on the mobile workstation I just bought. Even better than a strip of tape is to not have the lens there in the first place.
I guess it's an argument for just having an external webcam that you can plug in only when you want to use it. On the other hand, there are fewer and fewer laptops you can purchase, these days, without a webcam. So tape it is!
The microphone is a more difficult question. I don't know how effective taping over the microphone is.
It would be nice if someone simply designed a laptop with on/off switches for the microphone and webcam. Not switches to trigger some software based disabling of the devices. But switches that actually physically break the circuit of the wires that connect the devices.
SOMEONE’S ALWAYS WATCHING: HACKER SENDS WOMAN PHOTOS OF HER EVENING FROM HER OWN WEBCAM
i might be quite flattered if this happened to me. also, shows you what a loser the hacker is.
Separate names with a comma.