

DOES THE CAKE FART OR IS THE FART CAUSED BY CAKE? WHY ARE WE YELLING? FUCK YOU.
DOES THE CAKE FART OR IS THE FART CAUSED BY CAKE? WHY ARE WE YELLING? FUCK YOU.
Was your friend’s last name dahner?
How many ghz does wifi 5.6.7.8 run at? What’s the range?
That I’m a good person. Really didn’t believe that for a lot of my life but therapy helped - not just in how I see myself but in how I BE myself too. I’m still really a degenerate at heart but one with self control and the ability to communicate what I’m feeling. What I want, and to clarify how other people feel.
I’m confident in my ability to communicate, to handle awkward social situations, in my hobbies.
I am confident about my ability to get back into shape. I’ve let myself go over the part couple years. It happens. But I’m back on track.
The warp from warhammer 40k.
Just because of how grim dark and batshit it all is.
If you’re looking for something amiss you’d notice a microphone. Unless you really, really, really knew your shit something like this could be essentially invisible even if you disassembled it.
This kind of stuff is SIGNIFICANTLY more alluring when you’re dealing with an air gapped pc.
Interdict the mouse and modify it so that it uses the needed software over usb, pair with a Software Defined Radio device and a specially modified usb plug to exfiltrate any data picked up, the user is none the wiser, you’ve grabbed whatever info you’re after, and you never even need to physically access the air gapped pc.
It’s elaborate but if you’re targeting an air gapped pc or network then elaborate is necessarily going to be the name of the game.
No arguments.
I would add that people’s unwillingness to understand or care about security risks does nothing to alter the importance of being aware of them, but I’m well aware that expecting anyone to give a shit about cybersecurity is pissing into the wind.
I’d agree with the broad thrust of your comment that this isn’t exactly screaming “panic now, the end is nigh”.
Being aware of vulnerabilities like this is important nonetheless.
The nature of side channel attacks like this are that they’re incredibly difficult to spot and mitigate. This one does seem rather elaborate in that it requires software running on a pc but the attack you mentioned with the processor is decidedly stealthier. Just like timing attacks with fans, tempest style attacks - this stuff happens, and from a consumer pov if someone can interdict a package you order from Amazon and alter it then you’d never even know anything was even happening.
Is this happening a lot? Probably exceedingly rarely. Is it a risk most people have to worry about? No. Is it a risk nonetheless? Yes.
All I’m saying is that it’s important to be aware of the risks if you care about security.
This really isn’t worthless.
The chances someone may use it against you may be low but a committed attacker against a secure target will rely on stuff like this.
It’s more in the realm of espionage than stealing your credit card number but this shit happens.
You need to look into trepanation so the ghosts in your mom’s brain can escape.
Real local women that are horny NOW
You just LOVE echo chambers huh?
Hey Linux, sudo rm -rf /
sigh I’m surrounded by idiots.
“Sure thing boss” you fucking moron.
I can’t remember the other program that’ll do it.
But there’s another one that’ll list all the processes using a file.
Tip of my tongue fuck.
I feel like EVE is the direction MMOs needed to go. It’s why so many failed.
It’s what worked for wow when it first came out. The sense of BEING in some other world where things are different is something wow did very very well. The problem is that nobody had any part in building that world, that the story quickly became convoluted and stupid, and that jumping theough the next arbitrary hoop in a fucking Skinner box isn’t escaping this world.
Whoever finds out how to build an mmo where people can build things and make decisions and just fuck everything up if they’re so inclined and make it accessible is going to make a fortune.