Linux & Tech news šŸ“°

2 Likes
1 Like

For those who might read it and being clueless about Kaspersky…don’t.
Just don’t.

:clown_face: :postal_horn:

4 Likes
2 Likes

Net find

GrapheneOS now supports a ā€œduress passwordā€. This function allows users to set a special password that deletes all data when entered. Once triggered, the deletion process does not require a restart and cannot be interrupted.

7 Likes

Nice, but this should be used with caution IMO.
In front of an official (:man_detective:), if they understand what happened :smiling_face:, this could cause legal troubles I guess.
I have no legal experience, but it sounds to me like you destroyed a possible evidence.
I don’t know…

3 Likes

Depending on a country not doing so might cause you life…
Users should be careful regardless :upside_down_face:

3 Likes

Sure! But in such a country maybe nuking your system so shamelessly could cost your life as well.

Either way, at least they have no data.

I think Ms. von der Leyen used to have one of these phones.
No evidence, no conviction, in certain states. :smiley:

4 Likes

That’s the password you put in when your wife asks if she can see your phone.

Think About It GIF by Identity

6 Likes

That’s a legitimate use case!!!

6 Likes

What I’d like to know is if this software is CIA-approved? :male_detective:

I can just see it now…cue the opening sequence…

  • Secret Agent opens his Secure Phone
  • Discovers he does not run GrapheneOS
  • Is interrogated by villainous agents of ChaosOS*
  • Dies under ā€œduressā€
  • End Credits

*no affiliation with any existing OS.

7 Likes

As expected, Microsoft’s creepy move to spy on everything you do on your PC with Copilot+ Recall has backfired with widespread criticism over the potential privacy issues it could cause.

And, to add fuel to the fire, we now have a more disturbing development that could allow hackers to easily take advantage of a user’s Recall data. This is thanks to some key weaknesses that were discovered by Kevin Beaumont, an experienced cybersecurity researcher.

In his detailed blog, Kevin found out that even though all the data is processed locally, when Azure AI automatically OCRs (extracts text from images) the user’s screen, it is stored in an SQLite database in the user’s folder under a new ā€œCoreAIPlatformā€ folder inside ā€œAppDataā€.

That is where the problem lies, Microsoft is banking on the encryption already present on a user’s device, and is of the belief that a malicious actor would need physical access to a user’s device to compromise Recall data.

But, the thing is, all that data is stored in plain text and a simple InfoStealer Trojan could easily make short work of that, stealing all the information that Recall has collected, with the user being unaware of it.

7 Likes

grafik

8 Likes

the price you pay to be able to mind you own business, undisturbed by AI

LOL, so those idiots has just done twice the cost for exactly same spyware, including hardware level… :rofl:

Big :brain: move. FIGHT THE POWER :rofl:

Truly a :clown_face: :earth_africa:

5 Likes

Can’t wait to hear that pedos start using this feature and then the police get pissy when we can’t recover anything

1 Like

Twice the price to avoid disabling a feature? Smort

you do remember what microsoft thinks of ā€œdisableā€ right?
… edge?

1 Like

There are tools to remove it. AME does this perfectly well, as well as Atlas OS, Revi OS. I think it’s a bunch of Powershell commands and registry edits.