I spent time having video calls with LEOs, intelligence agents and military folks over the course of the past 6-9 months. I saw how broken and disjointed and tribal power has become within the world of American authority.

I now know things about how the US government and military work that I feel the public should know.

I could write a book or make a YouTube video. But both of those are to inflexible and risky. I want to spill the beans in a much more permanent and effective way. I would like to help the public understand what is really going on behind the scenes, as best as I have seen.

  • Steve@startrek.website
    link
    fedilink
    arrow-up
    10
    arrow-down
    4
    ·
    3 days ago

    SD card. Thumb drives are too easy to have malware. Nobody should plug in an unfamiliar thumb drive.

    • TehWorld@lemmy.world
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      2
      ·
      3 days ago

      There’s zero functional difference between an SD card and a USB stick as far as malware. Don’t plug in any unfamiliar data storage device.

      • Steve@startrek.website
        link
        fedilink
        arrow-up
        4
        arrow-down
        1
        ·
        2 days ago

        Not true. A USB device can emulate a keyboard and execute almost anything with no user action, just plugging it in. A bare SD card can’t do that.

        • TehWorld@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          Most SD card readers are just USB adapters. Even inside of most computers, they are just attached to an internal USB header.

          • Steve@startrek.website
            link
            fedilink
            arrow-up
            1
            ·
            2 days ago

            Yes. Thats a trusted device that you already have. The data on the card cant change the behavior of your card reader. However a new unfamiliar UBS device could contain malicious hardware.

    • RememberTheApollo_@lemmy.world
      link
      fedilink
      arrow-up
      4
      ·
      2 days ago

      Anyone with half a brain that receives an unknown data storage device is going to plug that in to an air gapped computer, preferably running a linux distro, and a base install with basic tools and AV software to look at a potentially damaging device and hopefully clean it. If it does contain malware that successfully wrecks the computer, just wipe and reinstall. Better yet if it has a CD drive so no malware can infect the reinstallation media/live install.

    • Trainguyrom@reddthat.com
      link
      fedilink
      English
      arrow-up
      8
      ·
      3 days ago

      Generally news orgs and the like who have a real reason to receive a thumbdrive with important docs from random people will have a method of mitigating the risk. For example, a former client who was a tax preparer had a dedicated laptop which was firewalled off from the network and could only access a document web portal to upload files from the flash drive as their mitigation strategy