

But when China steals all their (arguably not copywrite-able) work…
But when China steals all their (arguably not copywrite-able) work…
TLDR:
They found debugging commands that can be used to access the memory of the device over USB. This is as much a backdoor as any device that runs unsigned firmware
Unless you store secret files on your Bluetooth dongle, you shouldn’t have to worry about this.
Use unidentifiable backgrounds or remove them in post. I’d suggest small patches of sand, dirt or grass, walls, etc. Avoid anything that can be found on a map like mountains (and other large scale topography), buildings, power lines, etc.
Perhaps feed the convincing fake data so they don’t realize they’ve been IP banned/used agent filtered.
On the ground, near bus stops, parking lots, gas stations, anywhere people use them.
Does your car lock up outside of cell coverage? I’m not suggesting removing the radios themselves, just the antennas. To the car, it will just always be out of range.
The antenna used for talking to the keys might cause trouble, but those are either inherently short range inductive systems or are receivable using a 20$ RTL SDR to verify it’s not sending anything else.
Should be quite easy to remove any WiFi/cellular/satellite antennas from the car’s computer. (Might be trace/chip antennas, so make sure to get those). If you’re extra paranoid, get the GPS antenna too, so it can’t simply record data indefinitely.
Might take a few hours to go through the car to make sure you get everything, but you won’t be limited to super old cars.
You people realize that most crypto is even less private? Every transaction ever can be viewed by everyone, forever, by design.
Sure, a crypto wallet might not have your name on it when created, but good luck buying or selling any without giving away your identity.
Doesn’t everything do this? If someone gets access to your hard drive, your fucked anyways. AI chat logs are about the least problematic thing on there.
Looking at the logs if my Stable horde worker, more then half of requests made were to generate porn. They’d be shooting themselves in the foot regardless of if the filter worked as intended.
Randall did the math on this one: https://what-if.xkcd.com/31/
He assumes 64 GB microsd cards, if you use 1 TB ones, you could send 16 times more.
Easiest and most secure way? Mail (or hand deliver) a flash drive. That’s how they transfer data between super computers and data centers. (AWS even has dedicated trucks to do it)
No one’s gonna talk about how they turned referral links into a piramid scheme?
Next DEFCON is in two months, can’t wait to see them get absolutely pwned.
Seriously, what did he expect? The first thing you learn before getting a gun is to never assume a gun is unloaded or safe, even if you just checked it. Never point a gun at anything you do not want to shoot. As always, safety rules are writen in the blood.
I think it is highly unlikely someone gave him a gun without going over the basics of or of him intentionaly ignoring safety rules for the video.
These services, like most companies will store your data indefinitly, and can be hacked. You cound end up with your name, what ever infromation the service gave you, and contact info on the internet. This is not the end of the world, but something to be aware of.
If it’s local, try using over-the-air TV, if your close to a transmitter, you can get away with a fairly cheap antenna. (Or even just a paperclip.)
It pings out to google constantly regardless of where you are. You should be able remove it with adb, or use an app like NetGuard to block it from acessing the internet.
I don’t think the roof would be good at reflecting signals back at the device, it scatters them all throughout the building, rasing the noise floor. In a way, phone hotspots can cause less interference then a proper access point because they use a lower transmit power, and allow the other devices to reduce power.
https://xkcd.com/936/