mox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 9 months agoUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.comexternal-linkmessage-square64fedilinkarrow-up1632arrow-down17file-textcross-posted to: technology@midwest.socialapple_enthusiast@lemmy.worldtechnology@lemmy.mltechnology@lemmy.zip
arrow-up1625arrow-down1external-linkUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.commox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 9 months agomessage-square64fedilinkfile-textcross-posted to: technology@midwest.socialapple_enthusiast@lemmy.worldtechnology@lemmy.mltechnology@lemmy.zip
minus-squareconciselyverbose@sh.itjust.workslinkfedilinkEnglisharrow-up2arrow-down1·9 months agoIt still requires user level access, which means they have to bypass my login password first, which would give them most of that anyways. Am I missing something?
minus-squaretrolololol@lemmy.worldlinkfedilinkEnglisharrow-up1·9 months agoShady crypto mining apps for starters
minus-squareconciselyverbose@sh.itjust.workslinkfedilinkEnglisharrow-up1·9 months agoYes, if you install malware it can be malware. This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.
It still requires user level access, which means they have to bypass my login password first, which would give them most of that anyways.
Am I missing something?
Shady crypto mining apps for starters
Yes, if you install malware it can be malware.
This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.