aboutsummaryrefslogtreecommitdiff
path: root/docs/hardware
diff options
context:
space:
mode:
Diffstat (limited to 'docs/hardware')
-rw-r--r--docs/hardware/index.md2
-rw-r--r--docs/hardware/t60_heatsink.md2
-rw-r--r--docs/hardware/t60_lcd_15.md8
-rw-r--r--docs/hardware/t60_security.md32
-rw-r--r--docs/hardware/x60_heatsink.md2
-rw-r--r--docs/hardware/x60_keyboard.md2
-rw-r--r--docs/hardware/x60_security.md30
7 files changed, 39 insertions, 39 deletions
diff --git a/docs/hardware/index.md b/docs/hardware/index.md
index 51932d81..83a6c548 100644
--- a/docs/hardware/index.md
+++ b/docs/hardware/index.md
@@ -11,7 +11,7 @@ This section relates to hardware maintenance on supported targets.
- [ThinkPad X60/X60S: change the fan/heatsink](x60_heatsink.html)
- [ThinkPad X60/X60s: How to change the LCD
panel](x60_lcd_change.html) (incomplete. pics only for now)
-- [ThinkPad T60 15.1\" changing LCD panel](t60_lcd_15.html)
+- [ThinkPad T60 15.1" changing LCD panel](t60_lcd_15.html)
- [ThinkPad T60: change the fan/heatsink](t60_heatsink.html)
- [ThinkPad X60/X60S: hardware security](x60_security.html)
- [ThinkPad T60: hardware security](t60_security.html)
diff --git a/docs/hardware/t60_heatsink.md b/docs/hardware/t60_heatsink.md
index 5ed545ba..c090c80d 100644
--- a/docs/hardware/t60_heatsink.md
+++ b/docs/hardware/t60_heatsink.md
@@ -79,7 +79,7 @@ It lives!\
![](../images/t60_dev/0071.JPG) ![](../images/t60_dev/0072.JPG)
![](../images/t60_dev/0073.JPG)
-Always stress test (\'stress -c 2\' and xsensors. below 90C is ok) when
+Always stress test ('stress -c 2' and xsensors. below 90C is ok) when
replacing cpu paste/heatsink:\
![](../images/t60_dev/0074.JPG)
diff --git a/docs/hardware/t60_lcd_15.md b/docs/hardware/t60_lcd_15.md
index 76538d63..d05670f2 100644
--- a/docs/hardware/t60_lcd_15.md
+++ b/docs/hardware/t60_lcd_15.md
@@ -1,10 +1,10 @@
-Changing the LCD panel on a 15.1\" T60
+Changing the LCD panel on a 15.1" T60
======================================
-This is for the 15.1\" T60. If you have another size then the procedure
-will differ; for example, on 14.1\" you have to remove the hinges and
-the procedure is a bit more involved than on 15.1\".
+This is for the 15.1" T60. If you have another size then the procedure
+will differ; for example, on 14.1" you have to remove the hinges and
+the procedure is a bit more involved than on 15.1".
[Back to previous index](./)
diff --git a/docs/hardware/t60_security.md b/docs/hardware/t60_security.md
index 3874a27e..2129f9b7 100644
--- a/docs/hardware/t60_security.md
+++ b/docs/hardware/t60_security.md
@@ -71,10 +71,10 @@ Now remove that bezel. Remove wifi, nvram battery and speaker connector
Reason: has direct (and very fast) memory access, and could
(theoretically) leak data over a side-channel.\
**Wifi:** The ath5k/ath9k cards might not have firmware at all. They
-might safe but could have access to the computer\'s RAM trough DMA. If
+might safe but could have access to the computer's RAM trough DMA. If
people have an intel card(most T60 laptops come with Intel wifi by
default, until you change it),then that card runs a non-free firwamre
-and has access to the computer\'s RAM trough DMA! So the risk-level is
+and has access to the computer's RAM trough DMA! So the risk-level is
very high.
Remove those screws:\
@@ -130,7 +130,7 @@ gently):\
**Rationale:**\
Another reason to remove the microphone: If your computer
gets[\[1\]](#ref1) compromised, it can record what you say, and use it
-to receive data from nearby devices if they\'re compromised too. Also,
+to receive data from nearby devices if they're compromised too. Also,
we do not know what the built-in microcode (in the CPU) is doing; it
could theoretically be programmed to accept remote commands from some
speaker somewhere (remote security hole). **In other words, the system
@@ -139,12 +139,12 @@ could already be compromised from the factory.**
Remove infrared:\
![](../images/t60_dev/0040.JPG) ![](../images/t60_dev/0042.JPG)
-Remove cardbus (it\'s in a socket, no need to disable. Just remove the
+Remove cardbus (it's in a socket, no need to disable. Just remove the
port itself):\
![](../images/t60_dev/0041.JPG)\
**Rationale:**\
It has direct memory access and can be used to extract sensitive details
-(such as LUKS keys). See \'GoodBIOS\' video linked at the end (speaker
+(such as LUKS keys). See 'GoodBIOS' video linked at the end (speaker
is Peter Stuge, a coreboot hacker). The video covers X60 but the same
topics apply to T60.
@@ -153,20 +153,20 @@ Before re-installing the upper chassis, remove the speaker:\
Reason: combined with the microphone issue, this could be used to leak
data.\
If your computer gets[\[1\]](#ref1) compromised, it can be used to
-transmit data to nearby compromised devices. It\'s unknown if it can be
+transmit data to nearby compromised devices. It's unknown if it can be
turned into a microphone[\[2\]](#ref2).\
Replacement: headphones/speakers (line-out) or external DAC (USB).
Remove the wwan:\
![](../images/t60_dev/0045.JPG)\
-**Wwan (3g modem):** They run proprietary software! It\'s like AMT but
+**Wwan (3g modem):** They run proprietary software! It's like AMT but
over the GSM network which is probably even worse.\
Replacement: external USB wifi dongle. (or USB wwan/3g dongle; note,
this has all the same privacy issues as mobile phones. wwan not
recommended).
This is where the simcard connector is soldered. See notes above about
-wwan. Remove simcard by removing battery and then it\'s accessible (so,
+wwan. Remove simcard by removing battery and then it's accessible (so,
remember to do this when you re-assemble. or you could do it now?)\
![](../images/t60_dev/0046.JPG)
@@ -221,7 +221,7 @@ It lives!\
![](../images/t60_dev/0071.JPG) ![](../images/t60_dev/0072.JPG)
![](../images/t60_dev/0073.JPG)
-Always stress test (\'stress -c 2\' and xsensors. below 90C is ok) when
+Always stress test ('stress -c 2' and xsensors. below 90C is ok) when
replacing cpu paste/heatsink:\
![](../images/t60_dev/0074.JPG)
@@ -273,11 +273,11 @@ Extra notes
===========
EC: Cannot be removed but can be mitigated: it contains non-free
-non-loadable code, but it has no access to the computer\'s RAM. It has
+non-loadable code, but it has no access to the computer's RAM. It has
access to the on-switch of the wifi, bluetooth, modem and some other
power management features. The issue is that it has access to the
keyboard, however if the software security howto **(not yet written)**
-is followed correctly, it won\'t be able to leak data to a local
+is followed correctly, it won't be able to leak data to a local
attacker. It has no network access but it may still be able to leak data
remotely, but that requires someone to be nearby to recover the data
with the help of an SDR and some directional antennas[\[3\]](#ref3).
@@ -332,11 +332,11 @@ more risky and more costly to attack people.
\[2\] microphone {#ref2}
----------------
-It\'s possible to turn headphones into a microphone, you could try
-yourself, however they don\'t record loud at all. Also intel cards have
-the capability to change a connector\'s function, for instance the
-microphone jack can now become a headphone plug, that\'s called
-retasking. There is some support for it in GNU+Linux but it\'s not very
+It's possible to turn headphones into a microphone, you could try
+yourself, however they don't record loud at all. Also intel cards have
+the capability to change a connector's function, for instance the
+microphone jack can now become a headphone plug, that's called
+retasking. There is some support for it in GNU+Linux but it's not very
well known.
diff --git a/docs/hardware/x60_heatsink.md b/docs/hardware/x60_heatsink.md
index 0ecd5b10..231feaad 100644
--- a/docs/hardware/x60_heatsink.md
+++ b/docs/hardware/x60_heatsink.md
@@ -23,7 +23,7 @@ Hardware requirements {#hardware_requirements}
- isopropyl alcohol (sometimes called rubbing alcohol)
- your new fan and/or heatsink
- CPU thermal compound (some say Arctic MX-4 is good, others are also
- \'ok\')
+ 'ok')
- Something to spread the paste with
diff --git a/docs/hardware/x60_keyboard.md b/docs/hardware/x60_keyboard.md
index 70085aae..553b7517 100644
--- a/docs/hardware/x60_keyboard.md
+++ b/docs/hardware/x60_keyboard.md
@@ -7,7 +7,7 @@ for X60s and X60 Tablet.
Although slightly different, this guide can also be followed for the
ThinkPad X200, X200S and X200 Tablet. The screws are in more or less the
-same place, and it\'s the same procedure.
+same place, and it's the same procedure.
[Back to previous index](./)
diff --git a/docs/hardware/x60_security.md b/docs/hardware/x60_security.md
index 7767a99f..238cc9c0 100644
--- a/docs/hardware/x60_security.md
+++ b/docs/hardware/x60_security.md
@@ -84,11 +84,11 @@ The following is a summary of what you will remove (already done to this
system):\
![](../images/x60_security/0001_overview.jpg)\
Note: the blue lines represent antenna cables and modem cables. You
-don\'t need to remove these, but you can if you want (to make it tidier
+don't need to remove these, but you can if you want (to make it tidier
after removing other parts). I removed the antenna wires, the modem
jack, the modem cable and also (on another model) a device inside the
-part where the wwan antenna goes (wasn\'t sure what it was, but I knew
-it wasn\'t needed). **This is optional**
+part where the wwan antenna goes (wasn't sure what it was, but I knew
+it wasn't needed). **This is optional**
Remove the microphone (can desolder it, but you can also easily pull it
off with you hands). Already removed here:\
@@ -96,7 +96,7 @@ off with you hands). Already removed here:\
**Rationale:**\
Another reason to remove the microphone: If your computer
gets[\[1\]](#ref1) compromised, it can record what you say, and use it
-to receive data from nearby devices if they\'re compromised too. Also,
+to receive data from nearby devices if they're compromised too. Also,
we do not know what the built-in microcode (in the CPU) is doing; it
could theoretically be programmed to accept remote commands from some
speaker somewhere (remote security hole). **In other words, the system
@@ -111,7 +111,7 @@ Remove the speaker:\
Reason: combined with the microphone issue, this could be used to leak
data.\
If your computer gets[\[1\]](#ref1) compromised, it can be used to
-transmit data to nearby compromised devices. It\'s unknown if it can be
+transmit data to nearby compromised devices. It's unknown if it can be
turned into a microphone[\[2\]](#ref2).\
Replacement: headphones/speakers (line-out) or external DAC (USB).
@@ -120,12 +120,12 @@ Remove the wlan (also remove wwan if you have it):\
Reason: has direct (and very fast) memory access, and could
(theoretically) leak data over a side-channel.\
**Wifi:** The ath5k/ath9k cards might not have firmware at all. They
-might safe but could have access to the computer\'s RAM trough DMA. If
+might safe but could have access to the computer's RAM trough DMA. If
people have an intel card(most X60s come with Intel wifi by default,
until you change it),then that card runs a non-free firwamre and has
-access to the computer\'s RAM trough DMA! So the risk-level is very
+access to the computer's RAM trough DMA! So the risk-level is very
high.\
-**Wwan (3g modem):** They run proprietary software! It\'s like AMT but
+**Wwan (3g modem):** They run proprietary software! It's like AMT but
over the GSM network which is probably even worse.\
Replacement: external USB wifi dongle. (or USB wwan/3g dongle; note,
this has all the same privacy issues as mobile phones. wwan not
@@ -180,11 +180,11 @@ Extra notes
===========
EC: Cannot be removed but can be mitigated: it contains non-free
-non-loadable code, but it has no access to the computer\'s RAM. It has
+non-loadable code, but it has no access to the computer's RAM. It has
access to the on-switch of the wifi, bluetooth, modem and some other
power management features. The issue is that it has access to the
keyboard, however if the software security howto **(not yet written)**
-is followed correctly, it won\'t be able to leak data to a local
+is followed correctly, it won't be able to leak data to a local
attacker. It has no network access but it may still be able to leak data
remotely, but that requires someone to be nearby to recover the data
with the help of an SDR and some directional antennas[\[3\]](#ref3).
@@ -239,11 +239,11 @@ more risky and more costly to attack people.
\[2\] microphone {#ref2}
----------------
-It\'s possible to turn headphones into a microphone, you could try
-yourself, however they don\'t record loud at all. Also intel cards have
-the capability to change a connector\'s function, for instance the
-microphone jack can now become a headphone plug, that\'s called
-retasking. There is some support for it in GNU+Linux but it\'s not very
+It's possible to turn headphones into a microphone, you could try
+yourself, however they don't record loud at all. Also intel cards have
+the capability to change a connector's function, for instance the
+microphone jack can now become a headphone plug, that's called
+retasking. There is some support for it in GNU+Linux but it's not very
well known.