[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Captcha
Tor Only

Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord


File: 1625373083879.jpg ( 47.52 KB , 640x427 , baf67d975597a67d946fc15996….jpg )

 No.9789

What's the worst that could happen to a laptop with whatever flavor of GNU/Linux that has been left alone for hours, besides getting stolen? Let's assume there's no screenlocker but still need a password for privilege elevation.
>>

 No.9790

You get all your saved online accounts compromised?
>>

 No.9806

someone cooming on the keyboard
>>

 No.9811

>hours
Someone flashes your motherboard with spyware.
>>

 No.9819

you can literally use a trivial utility like bashbunny to brute force your password, probably in a matter of minutes, and then make a copy of your harddrive. This is why you always use full disk encryption.
>>

 No.9821

File: 1625429176660.jpeg ( 6.52 KB , 216x120 , th.jpeg )

Unironically safer than windows since most users don't understand how to use windows

pic related:
https://www.youtube.com/watch?v=WJtjZ-Skio

If the person is IT knowledgeable and knows how to look up for exploits and vulnerabilities, you arefucked up regardless of what you are using
>>

 No.9822

>full disk encryption
It better be full disk encryption (only possible with a coreboot/libreboot payload or using a USB drive as a decryption key) or you are susceptible to what's known as an evil maid attack.

https://twopointfouristan.wordpress.com/2011/04/17/pwning-past-whole-disk-encryption/
>>

 No.9838

>>9819
how well does bashbunny work? What if my password is 100 bits of entropy? How well…..
>>

 No.9840

File: 1625444558761.mp4 ( 3.49 MB , 1280x720 , 1622057155200-1.mp4 )

>>9822
>Ubuntu

You already fucked up.
>>

 No.9853

>>

 No.9878

Wouldn't just /dev/zeroing your drive after backing it up with a live image be enough to get rid of any tampering (on the software level)?
>>

 No.9886

>>9878
maybe not if they could flash compromised bios or install some physical keylogger or other bugs?
(on the software level then yes?)
>>

 No.9945

>>9789
as long as your disk is unencrypted and no BIOS password is set it is easy to boot from a USB drive and access all your data
>>

 No.9946

>hard drive dump
>bruteforce dictionary attack
>bios specific vulnerability
>hardware keylogger (hard to do)
>swap out WiFi chip for compromised one
That's all I got
>>

 No.9951

>>9789
What a shit question. Depends on what was on it, duh. If you really want hypotheticals then I guess the absolute worst is that it could lead to nuclear holocaust.
>>

 No.9959

Someone might install Windows on it.

Unique IPs: 8

[Return][Catalog][Top][Home][Post a Reply]
Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
ReturnCatalogTopBottomHome