Comment on Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
cmnybo@discuss.tchncs.de 4 days ago
Don’t leave cameras uncovered. Webcam covers are cheap. Tape works too.
Comment on Automated Sextortion Spyware Takes Webcam Pics of Victims Watching Porn
cmnybo@discuss.tchncs.de 4 days ago
Don’t leave cameras uncovered. Webcam covers are cheap. Tape works too.
tal@lemmy.today 4 days ago
I mean, true. But I kind of feel like once you’ve got malware on your system, there are an awful lot of unpleasant things that it could manage to do. Would rather focus more on earlier lines of defense.
The “try and sextort” thing might be novel, but if the malware is on the system, it’s probably already swiping all the other data it can anyway.
It sounds like in this case, the aim is to try to get people to invoke executables by presenting them as ordinary data files:
Like, I kind of feel that maybe a better fix is to distinguish, at a UI level, between “safe” opening and “unsafe” opening of something. Maybe “safe” opening opens content in a process running in a container without broader access to the host or something like that, and maybe it’s the default. That’s what mobile OSes do all the time. Web browsers don’t — shouldn’t — just do unsafe things on the host just because someone viewed something in a browser — they have a restricted environment.
In a world that worked like that, you need to actively go out of your way to run something off the Internet outside of a containerized environment.