I’ll go first: r/kitty. One of the hundred grillion cat subs back on Reddit, the culture in this one was you posted a cat picture, and the only word allowed in the title or in any comments or replies was “Kitty.”

Someone is using that subreddit for covert communications, I just know it. Either on the level of “if u/PM_me_your_nostrils posts an orange cat, we attack at dawn!” or there’s some steganography going on with the pictures, but that subreddit was too stupid to be as active as it was.

  • TheBrideWoreCrimson
    link
    fedilink
    arrow-up
    28
    ·
    edit-2
    2 months ago

    That Absolute, see also here, is something nefarious, possibly used for industrial espionage. My company is a client and using one of its IP addresses, I could see documentation that was quite concerning. In the background, it checks all of your files for anything that looks like a password, a social security number or a credit card number, then uploads these files to some server to protect them… What’s really weird is that I cannot access the same information from an outside IP address, but here’s a review, corroborating parts of it. Make of it what you will!

    • MIDItheKID@lemmy.world
      link
      fedilink
      arrow-up
      7
      ·
      2 months ago

      Absolute is crazy. I work at an organization that uses it. It lives in the bios level and is essentially a root kit. I understand how it is useful for lost/stolen devices, but it way over steps a lot of boundaries.

    • WindyRebel@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      edit-2
      2 months ago

      I read through that and maybe I missed where they are uploading personal data to a server? What I read is that it checks the computer and files and can interpret when there are personal data things on a PC in order to provide a score to help IT know how sensitive a computer’s data might be?

      It says the identification is done at the endpoint and the contents of the file are not available. I don’t see anything about copying and storing that data somewhere on their systems that I saw. Maybe I am missing something…

      • AA5B@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        2 months ago

        My company may appear similar, but I’ve been through the code - when they say they quarantine some stuff and create a legal archive of other stuff, hey really do, and no ones getting to it without jumping through a lot of hoops

        • WindyRebel@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          2 months ago

          Interesting. I’ll have to read up on this stuff. I’m working on making a career jump into IT so this will be right up my alley to learn about. Thank you.

    • michaelmrose@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      2 months ago

      If they ever get compromised all their customers will have a fun time. I wonder if their is a bail out plan.