this post was submitted on 13 Aug 2024
30 points (100.0% liked)
Hardware
707 readers
267 users here now
All things related to technology hardware, with a focus on computing hardware.
Rules (Click to Expand):
-
Follow the Lemmy.world Rules - https://mastodon.world/about
-
Be kind. No bullying, harassment, racism, sexism etc. against other users.
-
No Spam, illegal content, or NSFW content.
-
Please stay on topic, adjacent topics (e.g. software) are fine if they are strongly relevant to technology hardware. Another example would be business news for hardware-focused companies.
-
Please try and post original sources when possible (as opposed to summaries).
-
If posting an archived version of the article, please include a URL link to the original article in the body of the post.
Some other hardware communities across Lemmy:
- Augmented Reality - !augmented_reality@lemmy.world
- Gaming Laptops - !gaminglaptops@lemmy.world
- Laptops - !laptops@lemmy.world
- Linux Hardware - !linuxhardware@programming.dev
- Mechanical Keyboards - !mechanicalkeyboards@kbin.social
- Microcontrollers - !microcontrollers@lemux.minnix.dev
- Monitors - !monitors@lemm.ee
- Raspberry Pi - !raspberry_pi@programming.dev
- Retro Computing - !retrocomputing@lemmy.sdf.org
- Single Board Computers - !sbcs@lemux.minnix.dev
- Virtual Reality - !virtualreality@lemmy.world
Icon by "icon lauk" under CC BY 3.0
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
This is really bad because unlike previous exploits, if you get owned, you have no way of ever knowing. No virus scan can detect it, no OS reinstall will remove it.
But the attacker/hacking tool needs admin/kernel access in the first place.
Which all dangerous exploits already give. Next time there's a new published exploit for Linux or Windows, you could have been affected but will never know and will never be able to remove.