• 0 Posts
  • 13 Comments
Joined 3 months ago
cake
Cake day: August 12th, 2024

help-circle



  • “Evolutionary reason” does not necessarily mean that a feature is an advantage. Mutations are random and then positive or negative selective pressure act on them untill the mutation is either extinct or is adopted by the whole population. For features without selective pressure the same thing still happens it just takes longer and is basically random. So different populations of a species will always develop different features even when given the same environment.

    So for most of the features you listed: yeah it just happened.







  • groet@feddit.orgtoTechnology@lemmy.worldWhat the hell Proton!
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    1
    ·
    1 month ago

    Client isolation doesn’t help. That is just the access point not routing traffic between connected devices. The problem with WiFi is it is a radio signal. Everybody in range can receive 100% of all communication on that network. Just by being in range the attacker can do passive sniffing. No wiretap needed like with cabled networks.

    WiFi is encryoed if it uses a password. So any public WiFi without a password can be sniffed by literally every device in range (no need to connect to the WiFi for sniffing). On public WiFi with a password, the radio signal is encrypted but everybody knows the encryption key. So everybody connected to the WiFi can still sniff the traffic of everybody else.

    That encryption is only on the WiFi level, so encrypted radio signals, not on the actually traffic level (like TLS/HTTPS etc).


  • groet@feddit.orgtoTechnology@lemmy.worldBe careful.
    link
    fedilink
    English
    arrow-up
    74
    ·
    2 months ago

    No, why would it? It will run code in the context of the current user which is absolutely enough to start a new process that will run in the background, download more code from a attacker server and allow remote access. The attacker will only have as much permissions as the user executing the code but that is enough to steal their files, run a keyloggers, steal their sessions for other websites etc.

    They can try to escalate to the admin user, but when targeting private victims, all the data that is worth stealing is available to the user and does not require admin privs.