• Socsa@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    24
    ·
    7 months ago

    Honestly I can see this being the worlk of someone who had to deal with one of those stupid fucking online interview code tests which require crazy screen monitoring permissions. What a better way to kill off that trend entirely than to make the very practice an active cyber-security risk?

    • MotoAsh@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      ·
      7 months ago

      Accelerationism is a very difficult thing to defend, though mostly because the evil shits of the world will keep pushing once most people wake up to how shitty everything is. Helping them to make things shitty is quite directly only helping shitheads further their goals.

  • circuscritic@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    ·
    edit-2
    7 months ago

    They don’t say who was targeted, but I bet this is a backdoor way to infiltrate specific projects. So if they have a list of 163 projects they see a benefit in gaining some sort of access to, they then compile a target list from the relevant developers/contributors to all of those projects, and go from there.

    This isn’t the type of campaign that can be spammed to anyone and everyone both due to logistics and to minimize exposure of the tools being used.