Hacker Newsnew | past | comments | ask | show | jobs | submit | testTED's commentslogin

Strengthening this comment because to those who haven't used them they look useless.


Whose "latest updates"?



They did not even do a quick dump of the Slack contents anywhere?


I would think they have all the messages from Slack (it’s how they were able to write the Twitter Files), but who knows what format it’s in.


Radio waves.


How?


Buy an apartment in some Highrise for best reception. Anonymously register it to a shell company based in a tax heaven. UV Gov will think this is 'legal' tax evasion just like thousands of landlords.

Put any equipment you want inside generic chest on a balcony.


Ship the equipment in, inside an unsuspecting container, on a container ship from China headed for the US. Send two spys in as tourists. Have them rent a truck, pick up the equipment, and just drive it around in target areas.


with cell phone snooping gear, probably


It wasn't always defined that way.

Honest effort and intent was at least somewhat common on both sides of paid service at one point.

Honor is a dead concept.


That is not most devops roles.


Similarly, most modern smartphones have an easily toggled Invert Colors filter near or adjacent to Accessibility.

On Android, one can set this as a pulldown chip.


You kept the router?

Did you at least flash it?


Yup. That's what the "fixed by an update" part referred to.


There's a difference between pressing "update" in a known-compromised device's webUI, and flashing it from the outside.


The advisory stated affected devices could be update through the device UI.

https://kb.netgear.com/000061982/Security-Advisory-for-Multi...

But if it didn't, then that's another can of worms.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: