Cybersecurity professional with an interest in networking, and beginning to delve into binary exploitation and reverse engineering.

  • 0 Posts
  • 61 Comments
Joined 6 months ago
cake
Cake day: March 27th, 2024

help-circle











  • For what it’s worth, both Android and iOS are vulnerable to zero click RCEs, see NSO Group and their Pegasus spyware.

    One of the reasons we don’t really have zombie phones in botnet swarms is because selling the RCE on the grey market is way more lucrative than burning it to infect some devices for a botnet since phones are way more attractive targets than computers if you’re actively targeting an individual.

    A fully compromised smartphone is will give access to practically all of a target’s communications: their phone calls, SMS messages, encrypted text messaging (Signal/WhatsApp/iMessages) and probably their email as well. You will also gain access to a good portion of their web browsing, and their is a very good chance you will gain access to their 2FA as well (Authenticator application or SMS) allowing you to further easily compromise any of their online accounts. Plus, you gain access to any files on their phone (which are often very good kompromat if your goal is to blackmail), their live location and the ability to spy on them covertly through the camera and the microphone.

    Compare that to a laptop. You gain access to some of their web browsing, some files (often only professional in nature), and maybe access their camera and microphone some of the time, since the laptop isn’t always on and beside you.






  • I wouldn’t buy a used MacBook from an individual seller unless I could meet in person to verify there’s no BIOS/TPM lock going on that would prevent me from doing a secure erase and wiping the SSD to start fresh. A laptop with a replaceable ssd is probably less of an issue, but I’d still feel more comfortable having a picture of the BIOS showing no password set or anything, and a picture of it booted to desktop at minimum so you know it isn’t a stolen laptop that has a password no one knows. If you’re buying from like a second hand recycler or something, anyone that sells through significant volume of devices, I’d be much more comfortable just pulling the trigger sight unseen.




  • borari@lemmy.dbzer0.comtoLinux@lemmy.mlRunning a business using linux
    link
    fedilink
    arrow-up
    6
    arrow-down
    2
    ·
    edit-2
    3 months ago

    Yes, treating crypto as a way to invest is a scam. The vast majority of crypto and crypto-adjacent “projects” are scams.

    We live in a world where payment providers have the power to force Etsy to delist vendors that sell sex toys to customers of a legal age, payment apps like Venmo or PayPal will permaban your account for selling NSFW art or products, and physical cash is being largely abandoned for cards and digital wallets. Surely you can see the benefits of a completely anonymous payment method?

    To be clear, I vastly prefer cash, but there’s an obvious issue with trying to anonymously use cash to pay for something on the internet or to send money to someone who isn’t within easy driving distance.