Court documents detailing a recent FBI raid on a Washington Post reporter offer some important insights into risks to journalists and potential sources, and what can be done in response.
https://freedom.press/digisec/blog/wapo-raid-security-lessons/
Court documents detailing a recent FBI raid on a Washington Post reporter offer some important insights into risks to journalists and potential sources, and what can be done in response.
https://freedom.press/digisec/blog/wapo-raid-security-lessons/
Reboots after updates are also important, and fully closed devices are harder to access.
If a device is powered off, an attacker with physical access generally must either (a) obtain the user passcode and unlock the device normally, (b) exploit a hardware vulnerability in the device’s secure element or bootloader (rare and device-specific), or (c) perform sophisticated attacks before shutdown (cold-boot or memory imaging while powered or in sleep).
https://www.heise.de/en/news/Mac-tool-turns-MagSafe-cable-into-a-safety-switch-11167691.html