There have been multiple accounts created with the sole purpose of posting advertisement posts or replies containing unsolicited advertising.

Accounts which solely post advertisements, or persistently post them may be terminated.

vegivamp ,
@vegivamp@feddit.nl avatar

As if any spyware worth it’s salt didn’t install itself as service with an innocuous name. Something like “Facebook” or “TikTok”.

distractedcactus ,
@distractedcactus@beehaw.org avatar

This is good advice if your phone is actively being hacked in real time when you turn it off. Otherwise all you’re doing is delaying or temporarily interrupting any data collection that’s going on in the background. Any apps that are sophisticated enough to run undetected by a normal user are also going to restart themselves as soon as the phone boots up again.

Also, if you are being targeted by a hacker that is knowledgeable enough to actively get into your device (especially an iPhone) without physical access then you’re better off destroying it and buying a new one, along with doing a full reset of all of your passwords, 2FA setup, and anything else you think you’re relying on for “security”.

cark ,
@cark@beehaw.org avatar

That is not true. Many attacks (e.g. the recently revealed Operation Triangulation) do not have persistence.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • lifeLocal
  • goranko
  • All magazines