view the rest of the comments
Technology
This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.
Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.
Rules:
1: All Lemmy rules apply
2: Do not post low effort posts
3: NEVER post naziped*gore stuff
4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.
5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)
6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist
7: crypto related posts, unless essential, are disallowed
Also left out of the headline is the fact that this attack was specifically designed to be leveraged against one specific common laptop, a MacBook. Admittedly, if you are using one it can be a concern, but it’s safe to assume that unless your attacker knows the exact model of computer you are using and dedicates serious resources in to building a targeted attack like this, you’re fine.
The tiniest variation will likely dramatically improve your security.
As a cybersecurity researcher, there are plenty of other attacks that are cheaper and easier to implement that you should be concerned about.
Security via having lots of crumbs and hair and crud built up inside your keyboard. Check.
So, just leave it with my kids and dog for 10 minutes?
Yes. Why go to all the trouble of doing very technical things when you can instead do moderately technical but very cunning things?
An old episode of the defunct Reply All podcast comes to mind: “what kind of idiot gets phished?”
https://gimletmedia.com/shows/reply-all/rnhoww/