• 0 Posts
  • 149 Comments
Joined 1 year ago
cake
Cake day: June 8th, 2023

help-circle



  • We’re making propaganda… Join us… the 4chan thread instructs

    So the campaign is coordinated

    4chan

    The visual guide instructs potential posters to create images that are “Funny, provocative. Redpilling message (Jews involved in 9/11). Easy to Understand.” Under an image that shows a crying Pepe the frog with a needle next to its arm and a gun pointed to his head, the guide says “vaccines enforced by violence.” Under an AI-generated image of two Black men with gold chains chasing a white woman, the guide said “redpilling message (migrant crime in scandinavia).”

    So they’re white supremacist fascists

    MAKE, EDIT, SHARE

    So they are inundating people with it

    whether you think it’s random fun or not is subjective, but the way they’ve described it is accurate.









  • To exfiltrate the login password from a keylogger on a macbook, for example, you need to have some software running on the cpu as well as the keyboard itself. This makes it very difficult to do in reality, as you have to infect both devices and if you do not have physical access, your exploit needs to be done across the keyboard interface, which makes it very hard to do in practice. Swapping any random keyboard in that could potentially be malicious introduces two issues, as now the keyboard itself may have a keylogger, as well as opening the possibility of exploiting some vulnerability in the cpu from the keyboard itself. You therefore open two attack surfaces that were previously closed, which is highly significant.








  • often are genuine, but Apple makes features not work unless paired

    Because unless you pair the screen, the device has no way to know it’s genuine. If it’s not, it could implement any number of attacks, including keyloggers, screen stealers, etc

    don’t believe

    Why shouldn’t I? No one has given an argument that you can actually secure these peripherals without software locks, I bought my iPhone and MacBook because they offer security, even when I run Linux on it my MacBook has far superior boot security (the only thing apple has engineering control over in that use case) than any intel machines I’ve used

    Also lol that article, you know the difference between one incident and a pervasive effort to mine your privacy for profit