• 0 Posts
  • 13 Comments
Joined 1Y ago
cake
Cake day: Jul 09, 2023

help-circle
rss

Yeah, and bots are software setup and configured by humans to do things for humans. It’s still kind of humans using the internet, just not actively at the keyboard.


Similar for me - 1Blocker and pi-hole at home. Then I also VPN to my home when outside to continue the pi-hole filter.

I also use iCloud relay with non-precise location.



I have no issue with security devices requiring some sort of approval (which should be made available to self service), but devices like the screen, camera, battery, buttons, memory/storage, ports, speakers, etc, should be allowed whether or not they are factory.


I got a couple of guys you can borrow as well; fuck shit up real nice


Bruh…lol

I just like what I like. I knew I was gonna get shit for chatting about it.


I’m not saying it can’t, but the attack surface is significantly reduced.


Right but in my line of business I don’t want it to even be possible. I already made my choice purchasing an iPhone knowing full well I’m locked into the AppStore and my MDM catalog. If I can sideload so can a nefarious actor.


It’s funny, I buy Apple products specifically so that that I can’t side load apps. At work we MDM and Apple’s approach isn’t for everyone, but forcing something like side loading simply isn’t the right choice for all types of users.

I’m all for encouraging them to be on the right side of Right-to-Repair, labor laws, and environmental best practices. But I left the world of side-loading and customization for the iPhone’s tight lockdowns. At first I still couldn’t help myself but to jail-break my first iPhone or two, then I stoped that also.



This is another example of very specific situations in INFOSEC. It’s unlikely that you will become a victim to this key logger attack. And of course the title suggests that Apple’s Find My network is compromised. This is not the case. But it is being utilized, in this instance, against Apple’s rules and regulations.

The real hack here is that the victim had their keyboard modified or was given a compromised keyboard that broadcasts Bluetooth signals, that are then picked up on the Find My network. It could be transmitted via Cellular, Bluetooth, WiFi, audible sound, monitoring energy differentials, etc. It’s the HMI hardware that’s been compromised. Apple will likely develop updates to their Find My network, but the compromised keyboard could then be modified to use some other service or broadcast methods. Apple fixing the Find My network to recognize bad actors will not prevent this style of attack.