• 0 Posts
  • 53 Comments
Joined 2 years ago
cake
Cake day: June 3rd, 2023

help-circle







  • Yeah. He addresses it without much of a response.

    And there’s good arguments to be made that my hotspot is still trackable. Plus some of the apps I keep aren’t great for privacy (like Duolingo, for example). Try as I might, there’s only so much “harm reduction” I can do, and I could certainly get more protection by doing more. But as I’ve written about before, privacy is a spectrum, not a binary state of being.

    He keeps a lot of crap that has user names and passwords. A VPN won’t really help with those.

    He also uses free public WiFi. It’s probably okay since a lot of phones have randomized MAC addresses now but with facial recognition, they can easily attach that address with your identity.











  • Depending on how Bluetooth stacks handle HCI commands on the device, remote exploitation of the backdoor might be possible via malicious firmware or rogue Bluetooth connections.

    I really wish these articles just tell us what these scenarios are. I understand companies need publicity or need to sell software but if it isn’t replicatable and the article says “might be possible” it kind of sounds like a secuity sales pitch.

    This is especially the case if an attacker already has root access, planted malware, or pushed a malicious update on the device that opens up low-level access.

    This part basically sounds more like a software issue where the attacker has a way in already. The system is already vulernable at this point before using the exploit found.

    I don’t think there’s enough information out yet.

    It is very interesting though.