mox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 1 year agoUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.comexternal-linkmessage-square64fedilinkarrow-up1631arrow-down17file-textcross-posted to: [email protected][email protected][email protected][email protected]
arrow-up1624arrow-down1external-linkUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.commox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 1 year agomessage-square64fedilinkfile-textcross-posted to: [email protected][email protected][email protected][email protected]
minus-squaretrolololol@lemmy.worldlinkfedilinkEnglisharrow-up1·1 year agoShady crypto mining apps for starters
minus-squareconciselyverboselinkfedilinkEnglisharrow-up1·1 year agoYes, if you install malware it can be malware. This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.
Shady crypto mining apps for starters
Yes, if you install malware it can be malware.
This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.