Skipper on Nostr: Stop with the fud. You sound like you are making excuses for being an iOS user. ...
Stop with the fud. You sound like you are making excuses for being an iOS user.
Malicious firmware embedded or upgraded in hardware need an interface within the running software of the device to send information back to the threat is performing the surveillance, it doesn't provide much of a stealth benefit. Many cases of malicious firmware have a stage that involves using injecting malware in the operating system, and making connections to a server to perform the command and control stage of a cyber attack. This connection would be needed so the C2 could recieve instructions, or for the target device to send information about itself. It must add presence into the operating system to access data from it, which makes it detectable.
https://stacker.news/items/705242/r/Skipper
Malicious firmware embedded or upgraded in hardware need an interface within the running software of the device to send information back to the threat is performing the surveillance, it doesn't provide much of a stealth benefit. Many cases of malicious firmware have a stage that involves using injecting malware in the operating system, and making connections to a server to perform the command and control stage of a cyber attack. This connection would be needed so the C2 could recieve instructions, or for the target device to send information about itself. It must add presence into the operating system to access data from it, which makes it detectable.
https://stacker.news/items/705242/r/Skipper