foone
I know this is about CloudStrike, but I just yanked an SD card out of a raspberry pi inside an IOT device. They deployed the developer's machine by duplicating the SD card.
This means every single device out in the wild has:
- the developer's command history
- the developer's browser history
- the source code to their code
- access to their private github repositories
- a username/password to one of their log servers
- the URL you need to GPS track any of their trucks
- the identity of their "stealth startup", because I can look up the names of all the developers on linkedin, see they all work for the same "stealth startup", and see that their email addresses all end in @SECRETCOMPANY.EGG
- their slack login (browser cookies)
So yes. developers just be deploying whatever
Anonymous asked:
Top 5 women?
goldiipond answered:
bro i can’t even top one woman ha ha h[two drums and a cymbal fall from the ceiling killing me instantly