mox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 8 months agoUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.comexternal-linkmessage-square63fedilinkarrow-up1633arrow-down17file-textcross-posted to: technology@midwest.socialapple_enthusiast@lemmy.worldtechnology@lemmy.zip
arrow-up1626arrow-down1external-linkUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.commox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 8 months agomessage-square63fedilinkfile-textcross-posted to: technology@midwest.socialapple_enthusiast@lemmy.worldtechnology@lemmy.zip
minus-squaretrolololol@lemmy.worldlinkfedilinkEnglisharrow-up1·8 months agoShady crypto mining apps for starters
minus-squareconciselyverbose@sh.itjust.workslinkfedilinkEnglisharrow-up1·8 months agoYes, if you install malware it can be malware. This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.
Shady crypto mining apps for starters
Yes, if you install malware it can be malware.
This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.