this post was submitted on 10 Sep 2024
141 points (96.1% liked)
Technology
59495 readers
3110 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
So it's just users installing untrusted apps to their phone?
They also can't do that without the user explicitly giving the app permission to do those things, unless they found an exploit or something, but the article doesn't say that.
Also, why would you have images with passwords in them on your phone anyway?
People really should know better nowadays than to do any of this shit. Every step here is preventable by the user just thinking about what they're really doing.
A lot of cryptowallets let the user log in with a randomly generated combination of words. They often ask the user to write those down on paper. However, some people just screenshot that. This malware looks for those combinations specifically.
you mean the seed? i though that should be written on paper, store in a safe, and never on any electronic medium.
Just like how people should use long unique passwords