Experimental browser for the Atmosphere
• If an attacker gains control over a satellite or injects malicious code into its communication protocols, they could intercept, alter, or reroute data between users and service providers. • This could allow them to spy on communications, steal credentials, or manipulate transmitted data.
Apr 29, 2025, 6:55 PM
{ "uri": "at://did:plc:o2fsik6k75hqhtrbtbry3o2p/app.bsky.feed.post/3lnxxffs6dk2j", "cid": "bafyreifh2llpxlotwe6mn6vjtokpokhklp6qc27mwwx725znrtw34uu7uy", "value": { "text": "• If an attacker gains control over a satellite or injects malicious code into its communication protocols, they could intercept, alter, or reroute data between users and service providers.\n\n• This could allow them to spy on communications, steal credentials, or manipulate transmitted data.", "$type": "app.bsky.feed.post", "langs": [ "en" ], "reply": { "root": { "cid": "bafyreigzfs2yenbyxax6dztuwwe5atawts2pb73xckbfi6lmbhdpyogj34", "uri": "at://did:plc:o3syolcwxhsjc5nb3vvnnsxl/app.bsky.feed.post/3llgzpq477i2j" }, "parent": { "cid": "bafyreiffdm4ghylmbtcf5vseydfu7qqpxs4ogdn3knvyvovw6y7iyh6n5m", "uri": "at://did:plc:o2fsik6k75hqhtrbtbry3o2p/app.bsky.feed.post/3lnxxffmdss2j" } }, "createdAt": "2025-04-29T18:55:05.437Z" } }