Global Feed Post Login
Replying to Avatar Guy Swann

Scenario:

#Hacking #Bitcoin #Cypherpunks

Say you had 10 minutes (minus finding it and setting up) with someone’s MacBook, and you wanted to “infect” or pull as much information from it as possible without ANY logs showing that you’ve done anything to it, or plugged in any devices.

The MacBook is closed, asleep, and locked with the basic password.

What could you do, and could you ensure that there was no indication at all (no logs whatever) that suggested you had tampered with it?

If yes, what would you need to pull it off?

#asknostr

Avatar
SuiGenerisJohn 1y ago

Find any comfort after this scenario? Hope so, good luck brother.

Reply to this note

Please Login to reply.

Discussion

No replies yet.