The Basic question is in the title there are more questions bellow but it is in context of the question in the title...hopefully
What i have read is that it can eavesdrop the Airgap PC via
- acoustic
- light
- seismic
- magnetic
- thermal
- radio-frequency
- physical media
I also read that it can receiving data but only if it has already been infested with malicious code so it has an kinda receiver on it to communicate. https://arxiv.org/abs/1804.04014 (Powerhammer). "In this case, a malicious code running on a compromised computer"
But what if the Airgap PC has no malicious code on it and it is completly manufactory clean? Apart from trusting all the factorys that are involved in the whole process of building that PC, apart from sneakernet updates/patches (I probably have to do it at some point but that is irrelevant), apart from all physically attacks.
I mean it more like is it with an know airgap attack (excute code on victims air-gap PC via magnetic, thermal etc., not eavesdrop) possible even though, again, there is no receiver (malicious code) on it. If im not wrong to communicate there has to be always a transmitter and a receiver?
I am just wondering because of PC components like WLAN-cards, do it has to been removed at hardware, or can it still be there without worrys? Can code just jumping on the invisible WLAN signal even though there is theoretically no signal because software-wise everything is turned of or is not installed (Hardware WLAN card is there but its not used)?