WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

1.4K

(post is archived)

[–] 2 pts

That's always been a thing, any device that runs on electricity generates a field.Point the right equipment at it, you can capture the fluctuations in this field and interpret them.

This story smacks more of a "I can take A and B and do C with them! Look!" There are easier ways to get things off air-gapped machines, including just paying some grunt money to stick a usb device into it.

[–] 2 pts (edited )

Yup. Distractions, either way. Fodder for the #IFLS folk. *edit: my point being, they will always used advanced tech against the people. You should never take for granted that they can "tap in" to your life whenever they want. All you can do is do what you know is right, regardless of the circumstances.

[–] 1 pt

>including just paying some grunt money to stick a usb device into it.

That's trading a problem for another, which is sometimes the thing to do

One witness is already too much

[–] 0 pt

Yes, but by then the damage could be done.

[–] 1 pt (edited )

"Listen, Gary? That's your name right? Let's make it short; you work as security staff at companyX, and you can be seen introducing that USB key on the surveillance video footage, right fucking there... That USB key, which we know now, was the attack vector on companyX's computers, and servers. Where 10 billions worth of data were stolen and damaged last week... So. Gary. The good news is that I can help you. But I can only help you if you help me. The bad news is that if I can't help you, as things stand out, you'll end up charged with a long list of computer crimes and you aren't going to get anything under 30 years in a federal prison. That is, unless, you help us out find who gave you that key.... So. Gary.... Who gave you the key?"