Sparkega

joined 1 year ago
[–] [email protected] 4 points 8 months ago (1 children)

I’ll give you a piece of my mind.

Just kidding. Thanks for the correction

[–] [email protected] 63 points 8 months ago (4 children)

Eliminates a malicious threat vector. Gives you piece of mind to charge your devices without worry that what you connect to is going to interact with your device.

[–] [email protected] 4 points 8 months ago

Give Swindon a chance.

 

Researchers analyzed 190 million hacking events on a honeynet and categorized the types of hackers into Dungeons and Dragons classses.

Rangers evaluate the system and set conditions for a follow-on attack.

Thieves install cryptominers and other profiteering software.

Barbarians attempt to brute force their way into adjacent systems.

Wizards connect the newly compromised system to a previous to establish 'portals' to tunnel through to obscure their identity.

Bards have no apparent hacking skill and likely purchase or otherwise acquired access. They perform basic computer tasks.

[–] [email protected] 2 points 1 year ago

It's a tool like any others. I think it's worth including in your kit for it's range of capabilities. This item is freely available and could be used by anyone. Including it in your assessment replicates the current threat environment.