[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]

/tech/ - Technology

"Technology reveals the active relation of man to nature"
Name
Email
Subject
Comment
Flag
File
Embed
Password (For file deletion.)

Matrix   IRC Chat   Mumble   Telegram   Discord


File: 1625373083879.jpg ( 47.52 KB , 640x427 , baf67d975597a67d946fc15996….jpg )

 No.9789

What's the worst that could happen to a laptop with whatever flavor of GNU/Linux that has been left alone for hours, besides getting stolen? Let's assume there's no screenlocker but still need a password for privilege elevation.
>>

 No.9790

You get all your saved online accounts compromised?
>>

 No.9806

someone cooming on the keyboard
>>

 No.9811

>hours
Someone flashes your motherboard with spyware.
>>

 No.9819

you can literally use a trivial utility like bashbunny to brute force your password, probably in a matter of minutes, and then make a copy of your harddrive. This is why you always use full disk encryption.
>>

 No.9821

File: 1625429176660.jpeg ( 6.52 KB , 216x120 , th.jpeg )

Unironically safer than windows since most users don't understand how to use windows

pic related:
https://www.youtube.com/watch?v=WJtjZ-Skio

If the person is IT knowledgeable and knows how to look up for exploits and vulnerabilities, you arefucked up regardless of what you are using
>>

 No.9822

>full disk encryption
It better be full disk encryption (only possible with a coreboot/libreboot payload or using a USB drive as a decryption key) or you are susceptible to what's known as an evil maid attack.

https://twopointfouristan.wordpress.com/2011/04/17/pwning-past-whole-disk-encryption/
>>

 No.9838

>>9819
how well does bashbunny work? What if my password is 100 bits of entropy? How well…..
>>

 No.9840

File: 1625444558761.mp4 ( 3.49 MB , 1280x720 , 1622057155200-1.mp4 )

>>9822
>Ubuntu

You already fucked up.
>>

 No.9853

>>

 No.9878

Wouldn't just /dev/zeroing your drive after backing it up with a live image be enough to get rid of any tampering (on the software level)?
>>

 No.9886

>>9878
maybe not if they could flash compromised bios or install some physical keylogger or other bugs?
(on the software level then yes?)
>>

 No.9945

>>9789
as long as your disk is unencrypted and no BIOS password is set it is easy to boot from a USB drive and access all your data
>>

 No.9946

>hard drive dump
>bruteforce dictionary attack
>bios specific vulnerability
>hardware keylogger (hard to do)
>swap out WiFi chip for compromised one
That's all I got
>>

 No.9951

>>9789
What a shit question. Depends on what was on it, duh. If you really want hypotheticals then I guess the absolute worst is that it could lead to nuclear holocaust.
>>

 No.9959

Someone might install Windows on it.

Unique IPs: 8

[Return][Catalog][Top][Home][Post a Reply]
Delete Post [ ]
[ overboard / sfw / alt / cytube] [ leftypol / b / WRK / hobby / tech / edu / ga / ent / 777 / posad / i / a / R9K / dead ] [ meta ]
ReturnCatalogTopBottomHome