TheGuySwann on Nostr: Scenario: #Hacking #Bitcoin #Cypherpunks Say you had 10 minutes (minus finding it and ...
Scenario:
#Hacking #Bitcoin #Cypherpunks
Say you had 10 minutes (minus finding it and setting up) with someone’s MacBook, and you wanted to “infect” or pull as much information from it as possible without ANY logs showing that you’ve done anything to it, or plugged in any devices.
The MacBook is closed, asleep, and locked with the basic password.
What could you do, and could you ensure that there was no indication at all (no logs whatever) that suggested you had tampered with it?
If yes, what would you need to pull it off?
#asknostr
Published at
2024-10-27 16:53:51Event JSON
{
"id": "3c0cc6399dcdb181a20e67debc53c361383ea00e2bb2b456072fac973cb792a0",
"pubkey": "b9e76546ba06456ed301d9e52bc49fa48e70a6bf2282be7a1ae72947612023dc",
"created_at": 1730048031,
"kind": 1,
"tags": [
[
"t",
"hacking"
],
[
"t",
"bitcoin"
],
[
"t",
"cypherpunks"
],
[
"t",
"asknostr"
]
],
"content": "Scenario:\n#Hacking #Bitcoin #Cypherpunks\n\nSay you had 10 minutes (minus finding it and setting up) with someone’s MacBook, and you wanted to “infect” or pull as much information from it as possible without ANY logs showing that you’ve done anything to it, or plugged in any devices.\n\nThe MacBook is closed, asleep, and locked with the basic password.\n\nWhat could you do, and could you ensure that there was no indication at all (no logs whatever) that suggested you had tampered with it?\n\nIf yes, what would you need to pull it off?\n\n#asknostr",
"sig": "d71a2daac91cbea66e01381a05ba8ff7db3d56211a0a0020e006d10eb15f824aff296d68f1dd695dfa62f7817141ad15147e060dd77945ffcca8cfb02973b6d8"
}