this post was submitted on 22 Mar 2024
626 points (98.9% liked)

Technology

59381 readers
4029 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

The attack has been dubbed GoFetch: https://gofetch.fail/

you are viewing a single comment's thread
view the rest of the comments
[–] just_another_person@lemmy.world 29 points 7 months ago (2 children)

Sure. Unless law enforcement takes it, in which case they have all the time in the world.

[–] GlitterInfection@lemmy.world 27 points 7 months ago (1 children)

Yup, but they're probably as likely to beat you up to get your passwords.

[–] brbposting@sh.itjust.works 16 points 7 months ago

No way! Even the evil ones will try to avoid jail.

Meanwhile they might have a friggin budget for the GrayKey, the Stingray

Definitely believe rights are more likely to be violated when they can just plug in or power on without getting their gloves dirty.

[–] conciselyverbose@sh.itjust.works 1 points 7 months ago (1 children)

It still requires user level access, which means they have to bypass my login password first, which would give them most of that anyways.

Am I missing something?

[–] trolololol@lemmy.world 1 points 7 months ago (1 children)

Shady crypto mining apps for starters

[–] conciselyverbose@sh.itjust.works 1 points 7 months ago

Yes, if you install malware it can be malware.

This specifically was in response to a claim about the police taking your laptop despite the fact that it doesn't appear to enhance their ability to do anything with possession of your laptop until they are able to bypass a password.