• WoahWoah@lemmy.world
    link
    fedilink
    English
    arrow-up
    7
    arrow-down
    1
    ·
    edit-2
    1 month ago

    I’m confused. Compromising a computer with a thumbdrive is cutting edge h4x0r tech?

    “We put tools to create a backdoor as well as a file scanner and exfiltrator on a USB drive! We’ve defeated air-gapped systems!”

    Ok

  • Daemon Silverstein@thelemmy.club
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    1
    ·
    1 month ago

    Before opening the article, I was thinking of something really, really sophisticated involving high-pitched sound and microphones (e.g. coil whine modulation through I/O processes), electrical inductance and electromagnetic fields carefully modulated to directly interfere on CPU instructions, Van Eck Phreaking (something like TempestSDR but fancier), precision-grade voltage meters to try and identify ongoing CPU instructions through quick teeny-tiny microvolt fluctuations over the power grid but, no, it’s the old fashioned way of malware transportation: portable disks.