• 0 Posts
  • 4 Comments
Joined 5 months ago
cake
Cake day: April 24th, 2024

help-circle

  • A decade ago I was contracting for MSFT as a database admin / data analyst.

    A far older and more experienced contractor told me that he had been part of a team in Saudi Arabia, in 1990, that intercepted computer and electronic equipment bound for Iraq’s air defense command and control systems, flashing the firmware with exploits and backdoors as fast as they could before they were sent to Iraq.

    Supply chain interception has been a thing for a while.

    EDIT: This is a total off topic aside, but hearing about and seeing shit like that at the various tech jobs I’ve worked is why I laugh when people say ‘oh but alexa only activates on keywords’ or ‘no its totally impossible for phones to listen to your convos and then give that data to advertisement systems’.

    Call me paranoid, I don’t care: If you don’t have a hardware disconnect for your microphone and personally have the source code to every bit of software, at every level, then we just have to take the giant tech corpos at their word.