Global Feed Post Login
Replying to Avatar Guy Swann

Scenario:

#Hacking #Bitcoin #Cypherpunks

Say you had 10 minutes (minus finding it and setting up) with someone’s MacBook, and you wanted to “infect” or pull as much information from it as possible without ANY logs showing that you’ve done anything to it, or plugged in any devices.

The MacBook is closed, asleep, and locked with the basic password.

What could you do, and could you ensure that there was no indication at all (no logs whatever) that suggested you had tampered with it?

If yes, what would you need to pull it off?

#asknostr

Avatar
Machu Pikacchu 1y ago

You must’ve found Christine Lagarde’s laptop 🤭

Reply to this note

Please Login to reply.

Discussion

No replies yet.