Thank you, fixed!
otter
Quoting the government portion
Apple declined to elaborate on the specific spyware attack since doing so could tip off the attackers about the company’s detection techniques. Still, the email references commercial surveillance provider NSO Group, an Israeli company notorious for developing the Pegasus spyware, which can sometimes hijack a smartphone simply by sending the user a single message. In the past, Pegasus has been found on phones belonging to activists, journalists, and politicians, with additional evidence pointing to governments possibly buying access to the spyware tech.
These spyware attacks can cost millions of dollars to develop. They can then expire once the software vulnerabilities they exploit are patched. As a result, commercial spyware providers and their government customers tend to deploy such attacks in a targeted fashion, rather than through mass deployment. Still, Apple’s alert underscores how pervasive commercial spyware has become, targeting users in nearly half of the world’s countries.
Honestly, this might be a good thing in that case. I didn't like when my default browser randomly changed
Ideally, this would also stop browsers (ex. Edge) from using dark patterns to try and trick you into changing to them
Full list from this comment on another thread: https://lemmy.ca/comment/8470544
ConisioAdmin.exe (Solidworks PDM)
EaseUS Disk Copy.exe (EaseUS Disk Copy Application)
ep_dwm.exe (ExplorerPatcher) Included since 22H2
iCloudServices.exe (iCloud files shared in Explorer via WhatsApp) from 23H2
RadeonSoftware.exe (AMD GPU perf settings) from23H2
StartAllBackCfg.exe (StartAllBack) Included since 22H2
Multi-mon + Copilot (Microsoft)
MergeSdb (Microsoft)
Intel IntcOED.sys (Intel)
Intel IntcAudioBus.sys (Intel) (%WinDir%\System32\drivers\IntcAudioBus.sys)
Realtek 8192su Wireless USB 2.0 Adapter (Realtek) (%WinDir%\System32\drivers\RTL8192su.sys)
USB-C PDcl2-𝕪ℙⓔʞɔɒds̷̬͑̉́̍̇̀̑̈́̇͊̄̊̑p̵̛̭̗̓̓̽̈́̿͋̂́̈́̎̔̔̋̓͑͜ä̸͚̥̼̼́͑̊̾̅̈́̌̈̎͡͝͡c̸͈͍͈͖̾͌̂̊̀͒͂̀̍́͝ḛ̵̪͔̭͖͔̯̑̔̓͗͜͝ͅ
~~I can't imagine anyone that would leave the device plugged in after the first ad comes up. Pretty much anyone using such a device would also know how to unplug them. They clearly have other uses for that screen, so it's not a total loss to keep it unplugged till the user can switch to a different brand.~~
Ah it's a Roku TV entirely. Reminds me of the Samsung TV ads
Roku TV sets come with ads. Generally, these are restricted to Roku's home and menu screens, its screensavers, and its first-party video channels, and once you start playing video, the only ads you'll see are the ones from the service you're streaming from. That said, Roku TVs have shown ads atop live TV before.
Now, the company is apparently experimenting with ways to show ads over top of even more of the things you plug into your TV. A patent application from the company spotted by Lowpass describes a system for displaying ads [...]
I don't really understand this headline
The bot made it? So why was it promoted as trending?
No one cares. Nobody around you understands the security, the need for it, and the requirements.
Well, I disagree based on personal experiences. It doesn't work for everyone, but I'm not trying to help everyone through this method
We explained that we weren't ready for images of our child to end up in the wrong hands via non-private apps. Another thing was telling them that the one single friend who had already got on board with this had already been recieving pics...
This really is the best way. Once there's a REASON for extra security, people understand and want to learn more. Once it's installed, other day or day conversations can take place there
If you start off with low priority / day to day conversations, they aren't as willing to put in the energy
Yep, we can't build something better by ignoring the risks