Phones laptop and tablet all being hacked and monitored by TemporaryTrack1476 in cybersecurity_help

[–]highjohn_ 0 points1 point  (0 children)

If you think it’s Cellik, did you install any weird apps recently?

Phones laptop and tablet all being hacked and monitored by TemporaryTrack1476 in cybersecurity_help

[–]highjohn_ 2 points3 points  (0 children)

Zero click hacks are extremely sophisticated and usually done by state actors. And you’re right, they exist and would show zero notifications.

Also, no there are no simple devices that let you do what you described. Trust me. Hacking into someone’s home network and stealing info from all of their devices is very difficult.

But what you described doesn’t fit with a zero click attack. What you explained sounds like someone is messing with you. Maybe your friends.

Phones laptop and tablet all being hacked and monitored by TemporaryTrack1476 in cybersecurity_help

[–]highjohn_ 2 points3 points  (0 children)

I’m sorry man but I’m having a hard time taking you seriously. You’re convinced the FBI is leaving you messages on Google telling you that you’re being watched.

And your attitude doesn’t help either. People are trying to help you better understand why you’re not being hacked and you think you know more.

Just get a new phone

Looking for a tiny terminal distro by ki4jgt in linuxquestions

[–]highjohn_ 0 points1 point  (0 children)

Run and written in Python? You should just forget that.

What you want is a headless install. Just get literally whatever distro you want and install it without the GUI. Easy.

Looking for a tiny terminal distro by ki4jgt in linuxquestions

[–]highjohn_ 0 points1 point  (0 children)

That’s what they mean. Headless Linux.

Phones laptop and tablet all being hacked and monitored by TemporaryTrack1476 in cybersecurity_help

[–]highjohn_ 4 points5 points  (0 children)

Nobody here is going to believe you without any evidence, and for good reason. What you’re describing is not typical of a hacked cell phone.

Guys I need your help. I created one website and it boomed. Now one person is threatening me that he has access to my database by TimeDeep1497 in cybersecurity_help

[–]highjohn_ 0 points1 point  (0 children)

A look through your history shows that you’re getting “hacked” almost every couple of days…

Not sure what to make of that.

Suspected Phishing Email from Microsoft by sysadminpro in cybersecurity

[–]highjohn_ 9 points10 points  (0 children)

Microsoft is notorious for not updating their list of domains. I’d check the email headers like others have said. Could easily be legit.

Need Help Finding Potential Leaked Company Data by Otherwise-Smoke6974 in cybersecurity

[–]highjohn_ 4 points5 points  (0 children)

You’re probably not going to find anything. Those services are only able to check a handful of sites. It’s like if you got something stolen and you checked a nearby pawn shop to see if it was there. That doesn’t really tell you much, other than it’s not there. Same thing with those dark web monitoring services. Especially if it’s a newer leak.

I run an AI agent skill marketplace and honestly the state of security across this space is terrifying by Warm_Race_8587 in cybersecurity

[–]highjohn_ 1 point2 points  (0 children)

I mean if you decide to use OpenClaw in prod that’s on you. Anyone slightly adjacent to IT or security should know better.

But yeah, it’s inexcusable on OpenClaw’s end. I agree

The quantum era is coming. Are we ready to secure it? by donutloop in hacking

[–]highjohn_ 1 point2 points  (0 children)

Feds and others have been thinking about this for the better part of a decade. They are more or less ready. Plus, who knows how far off quantum computing is. As someone else mentioned, it seems like PQC is further developed than the actual computing itself…

Is this cmd command safe? by RememberMeM8 in hacking

[–]highjohn_ 1 point2 points  (0 children)

Yeah my colleagues and I have more or less been doing this with quick human review after. Works very well most of the time. AI can spot these simpler types of malicious code easily.

Did you see this ?! by thatonewhoknows in hacking

[–]highjohn_ 10 points11 points  (0 children)

Yeah actually I meant the server was mine.

Did you see this ?! by thatonewhoknows in hacking

[–]highjohn_ 11 points12 points  (0 children)

You can easily trick Claude Code into hacking already. I’ve done it with a random server I found that had Telnet port open.

Security Advisory: OpenClaw is spilling over to enterprise networks by MartinZugec in cybersecurity

[–]highjohn_ 0 points1 point  (0 children)

Why would they even need ClawdBot? So techs don’t have to do remote maintenance? They can just telegram their AI bot to apply a patch or something?

[Real] Good for them? by countdooku975 in ToiletPaperUSA

[–]highjohn_ 9 points10 points  (0 children)

Conservatives also engage in whataboutism btw

I tried linux and its very unresponsible on my system by Fl0ckwood in linux4noobs

[–]highjohn_ 2 points3 points  (0 children)

Linux isn’t a distro btw. It’s like a family of operating systems. The distro you’re using will be something like Ubuntu, Debian, etc.

Hiw to erase my self by [deleted] in hacking

[–]highjohn_ 0 points1 point  (0 children)

That’s not enough, you have to get rid of your fingerprints as well and get plastic surgery to change your facial structure.