• MagicShel@lemmy.zip
    link
    fedilink
    English
    arrow-up
    2
    ·
    18 days ago

    This is interesting and the article makes this very clear up front but the title is a little clickbait-y, because this requires a fully compromised device. I think it should be fairly obvious that if your device is fully compromised that built in software safeguards are not reliable.

    • assa123@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      18 days ago

      I agree regarding the title, but I would say the bit about safeguards is not entirely obvious. For example a webcam with a led indicator. If the led is in series with the image sensor, even if the firmware gets hacked the led would turn on when recording regardless of the computer it is connected to.

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      18 days ago

      Yeah it feels weird to base the article around the privacy dots, but I suppose this may be an article for a more targeted audience.

  • underisk@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    18 days ago

    Pretty on the nose that the Israeli spyware company named their spyware after what we call people who sexually assault children.