I’m an electrical engineer living in Los Angeles, CA.

  • 0 Posts
  • 43 Comments
Joined 1 year ago
cake
Cake day: June 17th, 2023

help-circle



  • I’m speculating, but my guesses are:

    • Gathering enough karma to post on subreddits that have a minimum threshold.
    • Getting enough post and comment history to pass a casual inspection, either by human moderators or spam filters.
    • Maturing the account to the point where it can be sold to another shady company.
    • Generally having a lot of bot accounts ready, just in case.

    Once mature, it’s usually used for spam or astroturfing. There is a noticeable uptick around big elections, wars, etc.

    I saw one repost-bot that metastisized into the most vile porn-spam-bot you can imagine, but they’re usually more subtle than that.


  • They’re indistinguishable because they’re copied from top-voted posts that are a few years old (title, text, and image if applicable). It’s guaranteed to produce a post that fits the community and gets a lot of engagement, so it’s a cheap and effective way to mature a bot account. Once you start looking for it, it’s everywhere, and Reddit admins don’t care.







  • No, defense in depth is still important.

    It’s true that full-disk encryption is useless against remote execution attacks, because the attacker is already inside that boundary. (i.e., As you say, the OS will helpfully decrypt the file for the attacker.)

    However, it’s still useful to have finer-grained encryption of specific files. (Preferably in addition to full-disk encryption, which remains useful against other attack vectors.) i.e., Prompt the user for a password when the program starts, decrypt the data, and hold it in RAM that’s only accessible to that running process. This is more secure because the attacker must compromise additional barriers. Physical access is harder than remote execution with root, which is harder than remote execution in general.