

Any is it not variable?
Any is it not variable?
Not mounted by default I assume
Why not just use journalctl directly at that point
The fact that that made the news shows that that’s not a common occurance, not to mention that it was the guy’s own government who snatched his phone, not a foreign spy agency.
Trump has been attacking anyone who supports Palestine regardless of if they are crossing the border or not. People really should be cautious when travelling to countries with authoritarian governments but that’s not because they’re crossing a border or are in a foreign country, it’s the same caution that needs to be observed by anyone living in such a regime
I’m not talking about oop, I’m talking about the guy I replied to who said:
Any foreign travel (for whatever definition of “foreign” applies to you), should be made with the assumption that someone will be attacking your electronic devices.
Fair, then let me make my point clear: most people don’t have any reason to think they’re in any more danger of getting hacked abroad than at home. And I strongly dislike how blatantly paranoid comments like the above one get so many upvotes on lemmy. This is the geek’s version of doomsday prepping
I don’t know who you are but most people’s threat model doesn’t need to include a foreign government spy agency physically attacking their phones. That assumption itself is insanely paranoid.
Edit: Hello?? It feels weird to ask this are yall high profile government workers or else what makes you think foreign governements will be so interested in what you have in your phone?
The government then revealed that they had access to a third party tool that they used to break into the phone and recover its contents.
I’m not sure if we’re thinking of the same case but I also remember that the tool wasn’t ready in the beginning, which is why they tried the court method until it was
Newer sshd versions have built in timeout options btw
Double space
Before single newline
This is a huge upside of Linux. When something breaks you can make a web search and learn how to fix it, or that it’s unfixable. On windows you make a search and all you get is this bs and seo article spam
They fucked up their encryption so it has half the entropy they claim, they verify messages solely based on information from the message and their pseudo-tor thing isn’t encrypted. Also you can drain someone’s battery by sending them specially crafted messages
How is the link file executing malware? Can you put any shell script as the target?
The fact you can trick the NFC system on the phone into reacting to “phantom” payment events and intercept the resulting token sounds like a pretty big problem.
That’s not what’s happening though? It’s relaying a physical card’s nfc not tricking mobile contactless payments
How are you supposed to fine 7 vulernabilities in an hour anyways? No way they expect the applicant to actually find vulernabilities right? So you need to memorize a bunch and see if they are present, which doesn’t achieve anything other than testing your memorization abilities
Everything’s politics mfs when I refuse to treat them bcs they don’t like garlic