nyan

joined 1 year ago
[–] nyan@lemmy.cafe 17 points 2 months ago

There's also a buried reference to using a several-years-patched gpac bug to gain root access before this thing can do most of its stealth stuff.

Basically, it needs your system to already have a known, unpatched RCE bug before it can get a foothold, and if you've got one of those you have problems that go way beyond stealth crypto miners stealing electricity.

[–] nyan@lemmy.cafe 2 points 2 months ago (2 children)

It's kind of an iffy assertion. That's maybe the number of files it scans looking for misconfigurations it can exploit, but I'd bet there's a lot of overlap in the potential contents of those files (either because of cascading configurations, or because they're looking for the same file in slightly different places to mitigate distro differences). So the number of possible exploits is likely far fewer.

[–] nyan@lemmy.cafe 13 points 2 months ago (1 children)

Hmm. So is it actually the number of fraudullent papers that's up, or is it the number of frauds that get caught?

[–] nyan@lemmy.cafe 19 points 2 months ago (3 children)

There's a reason why most other groups on the emulation scene wait for a given console to be a couple of generations dead before they'll touch it. And Nintendo has always been touchy about their property (intellectual and otherwise) I'm not going to argue about who has the moral high ground here, but this result isn't unexpected.

[–] nyan@lemmy.cafe -2 points 2 months ago (1 children)

The pagers and walkie-talkies may well have been made in China too.

[–] nyan@lemmy.cafe 2 points 2 months ago (1 children)

China doesn't accept that Taiwan is a separate country, so I can't see it counting.

[–] nyan@lemmy.cafe 8 points 2 months ago

And if the panic button is going to call the police, how is that any different from the passenger using their phone to contact police? Seems like extra steps of middlemen and confusion when the passenger could just call once they feel the need.

Think of it as a backup for the phone in the case where, say, there's an adult and a kid in the car, the kid has no phone of their own, and the adult loses consciousness with their phone locked. Or the car is being actively jostled by a group of people (say it drove into the middle of an embryonic riot), causing the passenger to drop their phone, whereupon it slides under the seat. Or the phone just runs out of charge or doesn't survive getting dropped into the passenger's triple-extra-large fast-food coffee. It won't be needed 99% of the time, but the other 1% might save someone's life, and (presuming the car already has a cell modem it in) the cost of adding the feature should be minimal.

[–] nyan@lemmy.cafe 3 points 2 months ago

It would be pointless with my mother, anything involving technology developed after the 1980s goes were in one ear and out the other.

I just told mine, "If someone calls claiming to be me and says that 'I' am in trouble and need money, ask them [about thing from my pre-Internet childhood], and if they get the answer wrong, hang up, because it's someone else imitating my voice." No tech understanding required.

[–] nyan@lemmy.cafe 1 points 2 months ago (1 children)

Unfortunately, it's rare that we can control what hashing algorithm is being used to secure the passwords we enter. I merely pray that any account that also holds my credit card data or other important information isn't using MD5. Some companies still don't take cybersecurity seriously.

[–] nyan@lemmy.cafe 3 points 2 months ago

intelligent regex

That would be much, much worse than what we actually have. Complex regex are positively Lovecraftian. You'd be chanting "Ia! Ia! Cthulhu ftaghn!" before you knew it.

[–] nyan@lemmy.cafe 3 points 2 months ago (3 children)

Cracking an 8-char on an ordinary desktop or laptop PC can still take quite a while depending on the details. Unfortunately, the existence of specialized crypto-coin-mining rigs designed to spit out hashes at high speed, plus the ability to farm things out into the cloud, means that the threat we're facing is no longer the lone hacker cracking things on his own PC.

view more: ‹ prev next ›