Sort of like this!
Concerns over security are valid though. Assumptions to be made here include:
- The software allowing remote-monitoring by the victim must have been pre-installed (by the Victim).
- Such software would be configured to be accessible by the Victim, via their credentials.
- Such software would most likely be using additional infrastructure to process and route the Victim MacBook data.
From this, I'll segway into:
- If your # gets stolen, and no software like this is installed on your i[whatever]/laptop, then it is gone my friend.
- Aquisition of Victim's security credentials by any means results in unprecidented access to the software's features.
- Internet security is a myth. With enough traffic back and forth, wired or wireless, there is no such thing as an impossible encryption to crack
(infeasable, yes, but the exponential rate of technology adaption and expansion...).
Encryption/Decryption is a two-way function; every encryption has exactly one 'correct' decryption (duh). What is important is the transferral of
initial private values, such as a user's password they are setting, the private values used to encrypt secure transmission between a client and a
host initially, etc...
All that aside, it truely baffles me what some people are comfortable doing/having on digital machines and media. The question is not 'how will my
data be accessed', but really, 'who will have use for my information when it is accesed?'.
- 4th year Software Engineering Undergraduate who has just completed a robust course on Computer and Nework Security