Let's say I hypothetically take a pic of my private key with my phone. Is there anyway a person could remotely access that picture without me voluntarily sending it to them or by physically stealing and accessing my phone?
Let's say I hypothetically take a pic of my private key with my phone...
Yes
>not memorizing your private key
No, but it's better to always keep a copy somewhere. Take a pic and send it to me and I'll hold the backup for you.
>hypothetically
Ask Jen Law
>phone
Yes, first apple or google will see it, then followed by the NSA. If you want it to be private use a real camera and keep it on a flash card, and never access the picture on any internet connected device.
I'm not fucking with you, by the way. Having a picture of extremely sensitive data on you phone is a real risk. Smartphones devices can be infected if you make even the slightest mistake, such as charging it somewhere you shouldn't, or connecting to a public wifi somewhere, or downloading an innocent looking PDF file... the list goes on. Then uploading all your pictures to a server where the attacker has access is literally a piece of cake.
Not even to mention that, if your pictures are saved to a cloud service (which they normally do by default), they are already compromised, since you can't really know for sure who has access to what in the company providing the service. There also a risk that THEY are hacked, even if you are not.
Good one Nigger
What?
Thanks for the answers brahs. Anyway to know if a device is currently infected? Also can internet posts be deleted permanently? (assuming they're not in cold storage) If so how could that be accomplished?
Grandpa please.
>internet posts
>deleted permanently
nothing that ever appears on the internet is ever truly deleted
>Anyway to know if a device is currently infected?
Sometimes. The only device you can truly trust is one that is completely open source from the OS down to the hardware (such as a libreboot Thinkpad)
Easy to tell if it's infested:
Is it running windows?
Is it running closed source software?
Have you connected it to the internet?
Have you de-loused it?
Has it ever run windows?
Is it using an intel CPU?
Is it connected to literally any arris modem?
If the answer to any of those questions is yes, then you should not have a private key on there for long, or at the very least not much of value.
The only environment you should have a private key open in is one that is not connected to the internet.
Forgot to add:
Is it a smart phone?
If yes ... etc etc..
Just hacked your phone and stole all your linkies ;)
Thank you youngins for helping out a geezer like myself. Nice three digits there by the way kiddo.
Linkies? Is that some kind of Bit coin?
is ledger nano the best way to store coins?
dont be a fucking idiot.
That or figure out how to use Bitcoin core.
you first virgin
Post the picture here and we can tell you if it is exploitable.
>can internet posts be deleted permanently? (assuming they're not in cold storage)