• 0 Posts
  • 6 Comments
Joined 3 years ago
cake
Cake day: June 14th, 2023

help-circle

  • So we’re bashing the people who installed Linux now if they used something else first? What, if they’ve ever used windows we should send them to the Gulag? Wtf is this take? Like hey you dumb fucking person who finally figured out how to get away from the corporate software you were taught to use in high school, you are FuCkInG iGnOrAnT for putting yourself in this position in the first place!!1!

    Let’s not talk about the multi billion dollar industry spent locking people into an ecosystem from day 1, because blaming high schoolers and teenagers for not switching to an OS best know for running web servers is an awesome use of our time.

    Speaking from experience: no one thinks about operating systems as much as we do. We are not the norm. Most people don’t want to use the computer to begin with, but conceded its faster than hand writing everything. The guy who paved my driveway will never install Arch, because he only uses the computer to get paid. My office’s cleaner doesn’t understand how computers can even be unsafe.

    When I went to primary school we had windows computers. Same thing in high school. In uni, because I did comp sci, I used Linux and found it was better for me. 350 people went through first year with me. Most of them continued using Windows, although a good chunk used Mac too. Like 10 of us used Linux. It is easier not to switch and that’s not going to change. So can we stop having a go at people for not having the same interests as us, because that’s the only difference.



  • Yeah so targeting individuals or specific organisations is pretty hard. It sounds dumb but how do you get someone’s phone number if they don’t give it to you? Its hard unless you’re determined tbh which most people aren’t.

    Most hackers setup watering hole style attacks, or use phishing which is roughly the same concept. Basically they cast a wide net and see what they can grab, like the browser credentials of Debra from accounting who knows everything about compound interest and nothing about opening an .exe file in an email. There are some big game hunting groups, and the LinkedIn breach made some waves (see the fappening), but your run of the mill discord-as-a-c2 style hacker isn’t going after rich people.

    Someone “hacking a phone” likely put a kitchen scale iPhone app on the app store, which when first opened asks for permissions for microphone, camera, text messages, contacts and file storage, and sends all that information to Argentina for a week or so until their app gets banned.

    Also, the most likely person to hack your phone seems to be someone in your household, abusive parent or spouse sorta thing. Most common devices to get hacked are laptops, usually windows. Its just kinda hard to hack a phone. Unless you know a lot about compressed image formats and the iPhone messages app apparently because NSO made like 5 zero days in a row out of that.