by esens on 7/19/21, 2:28 PM with 168 comments
by 3pt14159 on 7/19/21, 3:22 PM
I'm sure there's a few journalists out there that take cybersecurity seriously, but I'd wager the vast majority are pretty trivially monitored.
by wolverine876 on 7/19/21, 4:19 PM
Attacks against the freedom of others and critics of government are a much larger threat to ordinary people than if they were surveilled themselves.
by coldcode on 7/19/21, 4:04 PM
by sneak on 7/19/21, 3:04 PM
I go one step further and leave the SIM card out, which means the SMS vulnerability path is closed too.
by nonameiguess on 7/19/21, 3:51 PM
The most shocking experience to me in trying to evaluate the Mac ecosystem when they released the M1 and I bought a Macbook Air is being in meetings where I'm using bluetooth headphones, take the headphones off and put them back on, and music.app automatically opens and comes to the foreground of my desktop. There is no supported way of disabling this user-hostile anti-feature. I look on Google and StackOverflow and all of the suggestions for how to disable it dating back to 2014 or whenever no longer work. Apparently, the likely answer is turn off System Integrity Projection, reboot, rename or remove the file containing the application launcher, turn SIP back on, and hope that doesn't break anything else and hope Apple doesn't revert your changes on the next system update.
That did not seem worth it. The fact that Apple Music can and has been used as an attack vector makes it even worse that it is so tightly integrated with the audio subsystem of the hardware as to take over your device thanks to movements you are making in the physical real world even when you may not be touching the device at all.
I just can't understand what the thought process was in making this a default behavior, let alone one that cannot be disabled.
by comodore_ on 7/19/21, 4:38 PM
by skarz on 7/19/21, 8:02 PM
Yeah, okay.
by j45 on 7/19/21, 4:40 PM
With windows server I used to have a target of balance in any attack footprint.. if Microsoft provided the OS, the component services that the server exists to provide should always try to be third party software (db, web server, etc) to try and minimize one type of escalation vulnerabilities… while possibly opening up to another, hopefully less worse set of holes.
by max_ on 7/19/21, 3:28 PM
by hugh-avherald on 7/19/21, 4:02 PM
(1) The ability to detect espionage from China and Russia (2) The inability to access journalists' phones
If you want an intel agency to be able to thwart Chinese intelligence activities, you can't also publicly state you won't be looking closely into members of a profession who act a lot like spies.
by TravisHusky on 7/19/21, 8:20 PM