• Gsus4@mander.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    edit-2
    2 hours ago

    burn your clothes too…and don’t forget to cleanse your intestines…you never know :D oh oh and screening for the sexually transmitted spyware.

  • melsaskca@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    6 hours ago

    Shit like this used to happen informally, and quietly. Now it’s splashed all over the internet, only because someone wanted it to be.

  • melsaskca@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 day ago

    For trump China does not need any secret spying devices. They know his motivation. They just need to flash their bankroll.

  • Bamboodpanda@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 day ago

    Trump probably thinks he’s above the rules, so of course he’d want to keep the solid gold microphone Xi gave him with the plaque that says “The Greatest Speeches Ever.”

    He probably thinks it would look great on his desk.

  • mlg@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 day ago

    I know people are reacting like its expected anyway because of the amount of espionage that goes on, but this is honestly more of a cold war era tactic.

    Why would China risk souring relations right after a major diplomatic trip with some throw away gadgets that any competent military security would find immediately and proceed to document it?

    China can just get that high level information via a million other ways including Trump himself. They probably have a truthsocial scrapper that automatically tells them exactly what Trump is gonna do next by deciphering his insane posts lol.

  • Treczoks@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 day ago

    Guess what I would do if I was a (foreign) guest of importance to any US president?

    And if I was visiting Trump, I would desinfect ASAP, too.

  • Folstar@lemmus.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 day ago

    The Chinese probably gave them normal gifts, pins, and phones because why waste money on tech when top secret files are stored in the bathroom and POTUS tweets sensitive information?

    • Tiral@lemmy.zip
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 day ago

      Yeah right. The CCP is probably the most decitful government in the world. As bad as the US government is (and it is) the CCP follows through with nothing. I thought it was pretty funny that they had American flags all over, it’s illegal every other day if the year.

      • Tommi Nieminen@europe.pub
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 day ago

        It’s tRump. He probably has the codes written in a post-it note that’s attached to his bedroom TV frame.

        • hume_lemmy@lemmy.ca
          link
          fedilink
          English
          arrow-up
          0
          ·
          1 day ago

          We can at least hope that somebody, even in this administration, knew better than to give him the real codes.

          “Yes sir, here’s the nuclear codes: FCKGW-RHQQ2-YXRKT-8TG6W-2B7Q8.”

          • Mycatiskai@lemmy.ca
            link
            fedilink
            English
            arrow-up
            0
            ·
            1 day ago

            We all know the nuclear codes, he says them on TV all the time. Person, Man, Woman, Camera, TV, Squirrel

            The dementia test is also the only code he can still remember. If they ever change the test he’ll fail.

    • Echo Dot@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 day ago

      Trump is as leaky as a sieve actually telling him anything would constitute a national security violation so he probably doesn’t know anything.

  • x00z@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 days ago

    Why throw them away?

    Good counterintelligence would be to get as many as possible and reverse engineer them.