this post was submitted on 06 Feb 2025
39 points (89.8% liked)

Privacy

1948 readers
321 users here now

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be civil and no prejudice
  2. Don't promote big-tech software
  3. No reposting of news that was already posted
  4. No crypto, blockchain, NFTs
  5. No Xitter links (if absolutely necessary, use xcancel)

Related communities:

Some of these are only vaguely related, but great communities.

founded 5 months ago
MODERATORS
 

Example: Intel ME, AMD PSP, and potential backdoor in the "Baseband Processor" in phones...

you are viewing a single comment's thread
view the rest of the comments
[–] electric_nan@lemmy.ml 10 points 2 months ago

Not every threat actor has access to every vulnerability. The top spies won't share their best tools with normal cops, for example. They can't risk their access/methods coming to light for relatively minor reasons. Consider your threat model, and do your best.