Event JSON
{
"id": "a97d6fceeaaf0c5e7d7fcf554e8fc2d32c62d4adaabbd56bbbf1d02dd0d69672",
"pubkey": "d2ebf9a73caf6f7ebe07f83b6559e2699f6265fff0e32216ccaa99bf58cc9d3b",
"created_at": 1773189507,
"kind": 1,
"tags": [
[
"proxy",
"https://infosec.exchange/@geeknik/116207747541432804",
"web"
],
[
"proxy",
"https://infosec.exchange/users/geeknik/statuses/116207747541432804",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/geeknik/statuses/116207747541432804",
"pink.momostr"
],
[
"-"
]
],
"content": "Your “air-gapped” computer isn’t offline. It’s broadcasting. Every chip hum, keystroke, and voltage ripple is a side channel with a lobbyist. The real security gap isn’t hardware—it’s the fantasy that physics needs permission.\nhttps://www.wired.com/story/how-vulnerable-are-computers-to-an-80-year-old-spy-technique-congress-wants-answers/",
"sig": "03c54bb3b0f20f71032a5e9c739044471eb749a379a3b4df6f114011a14afbfa910131d39b1cfb30773c53b6e3d816941063955ebc1208935e693971b56eb47c"
}