Many of the screenshots in the posted article are too small and blurry to be of any use. In the original article [1] they can be zoomed and are actually readable.<p>[1] <a href="https://blog.confiant.com/osx-hydromac-a-new-macos-malware-leaked-from-a-flashcards-app-2af28f1caa9e" rel="nofollow">https://blog.confiant.com/osx-hydromac-a-new-macos-malware-l...</a>
If you're going to censor someone's github profile, actually censor it. It took exactly 5 seconds to find the github profile in question, so you might as well either out them at this point or black out ALL the identifying information (there is exactly one google search result). I would have expected his user pic to be a stock photo used by a burner account or something, but it appears to be unique.<p>Anyway, very interesting research. I'm very curious why anyone would even see fit to make flashcards about this sort of thing, what makes it worth memorizing?
> US soldiers stationed on European bases that host nuclear weapons have exposed a multitude of sensitive security details -- including where weapons are stored & secret duress words -- by using flashcard learning apps that appear publicly in online searches<p>I'm wondering what's the name(s) of these flashcard apps ?