• 4 Posts
  • 102 Comments
Joined 1 year ago
cake
Cake day: July 4th, 2023

help-circle
  • Look, when it comes to security statistics, a lot of it is locked behind closed doors in all kinds of big security companies. I can tell you personally that I have worked in such a company and you could see a lot of exploitation (attempts) on Android devices. It was there.

    Look once there’s a CVE and there is a POC for it. Usually there comes a Metasploit module for it and then it’s for sure being used by a bunch of people.





  • MTK@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    4 days ago

    Honestly, brilliant move, even if the commercial sucks this is one of those “no bad publicity” situations since everyone is going to talk about the first AI commercial.

    But after watching this ad, it honestly looks pretty good, slight uncanny vibes but if I just took it as “artistic choice” (ironic I know) of actually feels like a really nice ad


  • Don’t over think it, start small, a home server. Then add stuff, you will see that it’s not that crazy.

    I personally have just one home server that locally creates encrypted backups and uploads them to backblaze.

    This gives me the privacy I need as everything is on my server that I own while also having the backups on a big reliable company.

    It’s not perfect but it fits my threat model








  • The computer probably has local security tools (such as an edr) that spy on you any way.

    You need to assume it is completely compromised.

    But… assuming this isn’t in violation of your company computer usage policy (which it very much might be and can put you in trouble) you can install any VPN (avoid spyware shit) and a different browser (ideally something a bit obscure, like librewolf) and this will bypass the MiTM as the the device that does the MiTM would be either:

    A) a network device that hijacks the HTTPS requests (VPN bypass this)

    B) the browser used by the company

    C) some other kind of software that atteches itself to all browsers via admin installed extensions (obscure browser might not be recognised by such software, be sure to check the installed extensions after letting the browser run for an hour)

    And once you are done you can check the certificate chain in the browser to confirm.









  • Eat raw veggies (salads)

    In the first week or two you won’t feel like it was a real meal since your body still craves sugars, fats and junk. But once you get past the cravings you find out that this huge meal filled with fiber is super filling but the calorie count is really low, and so you start losing weight