Upgrade your routers, OSes, etc.

  • Wildgrapes [she/her]
    ·
    3 years ago

    I only use non permanent operating systems like Tails on computer surrounded by faraday cages with all ports filled with epoxy.

    In fact this comment wasn't posted by me since I can't use the internet.

      • Wildgrapes [she/her]
        ·
        3 years ago

        The problem is the pigeons can be intercepted and tampered with via net guns... Gotta train them not to carry written messages but to peck out the desired message when they get to the destination. And eat poison if captured.

        • GrouchyGrouse [he/him]
          ·
          3 years ago

          I'm imagining a pigeon with a fake human tooth installed in its mouth with a cyanide capsule inside.

          • Wildgrapes [she/her]
            ·
            3 years ago

            I'll admit I was going to say they should crush a cyanide tooth but then I remembered they don't have teeth. But ya know I dig human teeth on a bird.

    • gvngndz [none/use name,comrade/them]
      ·
      3 years ago

      Most Operating Systems that are not outdated are as secure as your habits allow them to be. If you mostly use official packages, have strong passwords, and don't download random garbage you find on the internet, then you'll probably be fine.

      • p_sharikov [he/him]
        ·
        3 years ago

        don’t download random garbage you find on the internet

        Um, does the AUR count?

        • PorkrollPosadist [he/him, they/them]
          ·
          edit-2
          3 years ago

          The Arch User Repository basically operates on the idea that "You can review what's being installed, but it is entirely up to your technical competence to decide if this is what you want or not" Word will inevitably get out if some oddball package is doing something fishy, but if you're trying to do something really obscure it is worth taking a close look at it (this is not a thing most ordinary people have the training and experience to do though).

          It can be kinda sketchy, but it has a better record than some other package distribution systems.

        • gvngndz [none/use name,comrade/them]
          ·
          3 years ago

          The AUR is definitely a bit of a security risk. The best is to not use it at all, but if you have to use the AUR, then either make sure that the package doesn't have malicious code inserted into it or only use popular AUR packages that likely had someone else vet them already.

  • Lundi [none/use name]
    ·
    3 years ago

    Are you serious, though? Because I got a call with a phoneID from Russia and like the dumbass that I am, I picked it up.

          • Neckbeard_Prime [they/them,he/him]
            ·
            3 years ago

            Not at all. There was an iOS vulnerability semi-recently where if someone sent a text with an inline image that didn't have a proper header, the decoder library would flake out and hand it off to another library that had remote code execution vulnerabilities. All without you opening the text. It was basically exploits on top of exploits on top of exploits.

            Possibly related; these happen more than you'd think:

            • https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
            • https://techcrunch.com/2021/09/13/apple-zero-day-nso-pegasus/
  • Abraxiel
    ·
    3 years ago

    I read this and now my internet is out, thanks.