Comment on [deleted]

NutinButNet@hilariouschaos.com ⁨9⁩ ⁨hours⁩ ago

I place little value on someone’s educational experience anymore since a lot of this can and is usually learned from nearly any place on the web or dark web.

It seems that for an evil maid attack to occur, someone would need to leave the device unattended, specifically with their admin/sudo account logged in so they can create the access they want later. That is, unless they discovered an exploit in the system that enabled them to gain that access by some other means.

The three best ways someone would be proactive against this attack are:

If you suspect your device has been compromised, the best thing to do is to shut down and disconnect from the network (unplug Ethernet cable and consider removing the WiFi card; even with the device powered off) and have a professional inspect it. I say that because even if you reinstall the OS or even get another OS, there’s no way to tell if something hardware was added to allow intrusion if we’re worried about physical access being compromised to the device.

source
Sort:hotnewtop