I have a hell of a time manipulating files on my mobile devices from my other devices myself. If they have some easy trick to do it I'd love to hear about it.
No Stupid Questions
No such thing. Ask away!
!nostupidquestions is a community dedicated to being helpful and answering each others' questions on various topics.
The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:
Rules (interactive)
Rule 1- All posts must be legitimate questions. All post titles must include a question.
All posts must be legitimate questions, and all post titles must include a question. Questions that are joke or trolling questions, memes, song lyrics as title, etc. are not allowed here. See Rule 6 for all exceptions.
Rule 2- Your question subject cannot be illegal or NSFW material.
Your question subject cannot be illegal or NSFW material. You will be warned first, banned second.
Rule 3- Do not seek mental, medical and professional help here.
Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.
Rule 4- No self promotion or upvote-farming of any kind.
That's it.
Rule 5- No baiting or sealioning or promoting an agenda.
Questions which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.
Rule 6- Regarding META posts and joke questions.
Provided it is about the community itself, you may post non-question posts using the [META] tag on your post title.
On fridays, you are allowed to post meme and troll questions, on the condition that it's in text format only, and conforms with our other rules. These posts MUST include the [NSQ Friday] tag in their title.
If you post a serious question on friday and are looking only for legitimate answers, then please include the [Serious] tag on your post. Irrelevant replies will then be removed by moderators.
Rule 7- You can't intentionally annoy, mock, or harass other members.
If you intentionally annoy, mock, harass, or discriminate against any individual member, you will be removed.
Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.
Rule 8- All comments should try to stay relevant to their parent content.
Rule 9- Reposts from other platforms are not allowed.
Let everyone have their own content.
Rule 10- Majority of bots aren't allowed to participate here.
Credits
Our breathtaking icon was bestowed upon us by @Cevilia!
The greatest banner of all time: by @TheOneWithTheHair!
There’s proof it’s been done pretty much upto the limit of declassified FBI/CIA documents.
I see no reason to believe the government would have stopped — and if they did — I see many reasons Trump is likely to start it up again.
Stay Vigilant — but remember most of us are fine — they won’t waste risky and time consuming tactics like that on minor targets.
Possible? Yes. Going to happen? No.
If your authoritarian government wants you gone they don't need to pull off Hollywood Hacker shit. They can get you for "drugs" (that they planted) or even just outright "disappear" you. They can get rid of you quietly, anonymously, and only your equally powerless kith and kin will care.
This kind of evidence planting is only for REALLY FAMOUS PEOPLE, when they want to put them through courts and convince the peasantry that, actually, this guy deserved it, and don't be like him, before putting them in an electric chair.
https://en.m.wikipedia.org/wiki/Stan_Swamy
It has happened before. It can happen anywhere.
The Washington Post reported in December 2022 that hackers had planted evidence on Swamy's computer.
Jailed without trial under terrorism laws with "evidence" never presented. But surely such draconian laws only exist in India.
If the government scrubs my devices for evidence they're going to find a hell of a lot more than some fabricated antifa PDF. Lol
It's all perfectly legal to have but still. They would have absolutely no problem framing me with terrorism. Lol
If they try that shit on me, then I no longer have anything to lose do I. They might fuck around and find out. Now if they did that to everyone not a Republican, they literally call the rest of us terrorists? Then maybe we become the terror they so fear.
Soon or later this is all going come crashing down. Either we turn full fascism and it becomes 1984, or a bloody revolution to take our country back. Time going tell. Just saying we are almost to the point we're voting won't matter.
The concept of framing someone implies that there is an honest court to fool into convicting an innocent person.
The government already controls the courts, why make it complicated?
Because they also want to win the "court of public opinion"
Edit: Like just imagine they come up with something worse than "Terrorisr Plot". They could've just put CSAM in Luigi Mangione's phone/computer and then be like "Ooh this guy is a pedophile", and fox news are gonna go wild with it.
I mean, planted evidence is rampant with police, I'm sure digital evidence is just as easy to plant.
Pretty likely if you're important enough to be on their radar? They already use their own router backdoors to patch routers to keep chinese/russian/etc botnets out
They already use their own router backdoors to patch routers to keep chinese/russian/etc botnets out
Lol, those back doors were probably how they got in, in the first place.
They have back doors to prevent backdoors? Is it possible they are just too nearsighted to realize any backdoor could be exploited by anyone?
In my experience about half of IT workers are clueless drones, another quarter are just slackers, and the remaining quarter get everything done. Those two quarters trade people on the regular thanks to burnout cycles, but yeah, there are still plenty of IT staff out there making terrible, boneheaded decisions daily.
Its important to ride the line between slacking and getting shit done, as well as keeping up skills and not being bored.
My sysadmin uncle worried me about this when I was coming to China this time stating that all devices that enter the Chinese network have something on the root changed so that it calls home and even reinstalling the OS can’t fix it. I had two thoughts, one if this is possible I bet the NSA would do it does the same thing. Two, this felt like modern redscare to me.
I spoke to my university IT team and they said as long as I practiced internet safety like using a VPN this would be fine.
That said, I do see this as a valid threat. I believe using my own FOSS services over others makes this threat smaller to some degree. Encrypting everything. And when in doubt write it down on paper. The less tech you use the less this threat exists.
In a perfect world I wish I had a Linux portable device where I could manually turn off wifi and data.
stating that all devices that enter the Chinese network have something on the root changed so that it calls home and even reinstalling the OS can’t fix it.
Can someone with more expertise explain how this could be possible? Are you actually saying any device manufactured in China and sold within China have something changed? I don't see how this could be true if your bringing your own device from outside into China.
I'm going to guess that this is very much not true. For that to happen, every individual device would have to have an exploit that only China is aware of that gives them zero touch kernel level access where they invisibly install a rootkit that can't be flashed off. Now, if you connect to a network and it says you have to install something first in order to connect, then all bets are off. I've heard of some exploits where this could be possible for specific devices running specific versions of firmware or software, but they are exceptions that generally can't be replicated consistently in the wild.
I would say that if connected to a Chinese network, all of your traffic can be monitored, so a VPN would be heavily recommended.
It's not detailed enough to really know what they meant, but for example and if I recall correctly, Android on a phone can get rootkitted in such a way that resetting the phone will not remove what was installed. This is because Android has a "System" partition and a "User" partition. When you "reset" a phone, it only wipes the user partition in most cases, so any malware installed to the system side would be untouched.
This is why you have to be real careful if you should purchase an Android phone second hand from a private seller.
Im saying any device that is used within Chinese internet or data can have its root changed account to my uncle. As I said in my original comment I wonder if that’s possible and if it was why wouldn’t the NSA do it too. Or is it just redscare? He’s the head sysadmin for a large multi branch company BUT his field isn’t China, he got that from a colleague. So idk what to do with that info. My university has teams in China and they don’t worry about this. I decided to not worry about it.
Tin foil hat on it sounds possible and I’m sure it could be done in the US too but I am not an expert at all.
They're probably referring to rootkits that compromise the firmware of devices.
A lot higher now than it was before
Could they? Yes. Would they? Almost definitely not for most cases. There's plenty of crimes they can hit you with if you happen to get on the government's shit list. A month of active surveillance would give them evidence for a laundry list of felonies. Taking covert action to plant fake evidence is a level of risk that isn't worth it for the average person. If you happen to be a state level threat that calculus can change.
At this point, if you happen to be a state level threat, they don't need to plant evidence. They can just make it up out of whole cloth.
This can and may very well have been done. You might be able to catch it with forensics but odds are you can't afford an expert and a good lawyer if you're some rando that got targeted
Steve Huffman? The language guy?
Have anyone though about this?
Yes.
Am I just being over paranoid? Perhaps I watch too much movies...
Yes.
Most people's thoughts are absolutely boring and unimportant to the governments of the world.