• 1 Post
  • 1.82K Comments
Joined 3 years ago
cake
Cake day: June 17th, 2023

help-circle



  • True dat. But if they compromise your computer the first thing the look for is key files.

    Like my ssh keys are in a root permission file. Protected from general sight, but if somebody compromises my PC with a CVE on then goodbye keys.

    At least with hardware key it is removable and requires a button press.

    So accessing becomes physical access or quantum computer cracking









  • The what’s app is encrypted to get to your phone so transmission is protected, however to view your message it is unencrypted (obvious) and at that stage WhatsApp will parse it for key stuff such as Child Sexual stuff, or other threats they have determined they look for, that then triggers a data send back to the mother ship. The problem with this is if the Government wants to silence a political opponent or journalist they can go to Meta and request a search other than CSAM. So end to end encryption via any META product is a joke




  • The software locks out the auto discover and auto config of attached devices, unless they are in an allow list.

    Same like some android phone models where you can turn off USB port to protect your phone from being infiltrated.

    I did work at a place that filled the USB ports with HotGlue to stop workers loading movies on the computers on night shift