this post was submitted on 28 Jul 2025
1322 points (99.6% liked)

Microblog Memes

11517 readers
602 users here now

A place to share screenshots of Microblog posts, whether from Mastodon, tumblr, ~~Twitter~~ X, KBin, Threads or elsewhere.

Created as an evolution of White People Twitter and other tweet-capture subreddits.

RULES:

  1. Your post must be a screen capture of a microblog-type post that includes the UI of the site it came from, preferably also including the avatar and username of the original poster. Including relevant comments made to the original post is encouraged.
  2. Your post, included comments, or your title/comment should include some kind of commentary or remark on the subject of the screen capture. Your title must include at least one word relevant to your post.
  3. You are encouraged to provide a link back to the source of your screen capture in the body of your post.
  4. Current politics and news are allowed, but discouraged. There MUST be some kind of human commentary/reaction included (either by the original poster or you). Just news articles or headlines will be deleted.
  5. Doctored posts/images and AI are allowed, but discouraged. You MUST indicate this in your post (even if you didn't originally know). If an image is found to be fabricated or edited in any way and it is not properly labeled, it will be deleted.
  6. Absolutely no NSFL content.
  7. Be nice. Don't take anything personally. Take political debates to the appropriate communities. Take personal disagreements & arguments to private messages.
  8. No advertising, brand promotion, or guerrilla marketing.

RELATED COMMUNITIES:

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] DeathByBigSad@sh.itjust.works 2 points 9 months ago (2 children)

Under normal circumstances, they can't. But if they actually want to target you and they want to spend the time and resources, they could potentially send instructions to the backdoor to secretly sabotage the backup process:

Basically showing you that the backup is working, while in the background, it has been encrypting the files to a key they control during that backup process, and essentialy act as ransomware. (Modern computing has made hardware encryption so fast that it would be seamless, so it would be hard to notice that happening.)

So every time you check the backup's integrity, it uses the key to unlock the files and show you "everything is fine".

But when the time comes, they would nuke the keys from the Intel ME / AMD PSP then next time you try to access your files, you get an error message, then you try to plug in the backup drive, also shows errors. Because they already nuked the keys, you have a bunch of encrypted data you can't access.

Sounds far fetched, but theoretically its possible.

[–] Tuuktuuk@sopuli.xyz 6 points 9 months ago

Belarusian hackers apparently did pretty precisely this to the biggest airline in the Russia, Aeroflot. They had been doing something for a whole year that successfully disabled Aeroflot's backups, and deleted everything from every computer belonging to that company. They no longer know who's working for them, for example.

I'd assume they must've done pretty precisely what you just described. So, it has been done once. And it probably will be done again, somewhere.

[–] lauha@lemmy.world 2 points 9 months ago

They would just as well nuke me litetally if we are that far down