mox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 1 年前Unpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.comexternal-linkmessage-square63fedilinkarrow-up1634file-textcross-posted to: technology@lemmit.onlinetechnology@midwest.socialapple_enthusiast@lemmy.worldtechnology@lemmy.mltechnology@lemmy.zip
arrow-up1634external-linkUnpatchable vulnerability in Apple chip leaks secret encryption keysarstechnica.commox@lemmy.sdf.org to Technology@lemmy.worldEnglish · 1 年前message-square63fedilinkfile-textcross-posted to: technology@lemmit.onlinetechnology@midwest.socialapple_enthusiast@lemmy.worldtechnology@lemmy.mltechnology@lemmy.zip
minus-squaretrolololol@lemmy.worldlinkfedilinkEnglisharrow-up1·1 年前Shady crypto mining apps for starters
minus-squareconciselyverbose@sh.itjust.workslinkfedilinkEnglisharrow-up1·1 年前Yes, if you install malware it can be malware. This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.
Shady crypto mining apps for starters
Yes, if you install malware it can be malware.
This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn’t appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.