postnataldrip

joined 2 years ago
[–] postnataldrip@lemmy.world 8 points 1 week ago (1 children)

It was so good!

[–] postnataldrip@lemmy.world 2 points 4 weeks ago (1 children)

Gotcha, and apologies for missing your point.

I agree 100%, the privacy and security tradeoffs are enormous and concerning.

[–] postnataldrip@lemmy.world 5 points 4 weeks ago (3 children)

By all means call out if I've misunderstood, but the tracking vulnerability isn't that BLE (by design) makes devices visible to everyone within range, it's that by binding an unclaimed device to an account you gain the ability to look up that device via Google's service, rather than needing to be nearby - you can simply ask Google to call on its global network to find "your" device. In other words, there's nothing stopping me from setting an alert when a given BT device is nearby, that's spot on, but I can't fire up Google to look up that device when I'm not nearby, or look up its location history.

And yes needing to have never been connected to an Android device definitely reduces the victim pool, but (and to address the other reply) I'm guessing it'd mean devices that have only ever been connected to iOS, Linux, Windows etc aren't "claimed" and can still be enrolled by the attacker. It's not about default creds, only having used devices that don't enrol with Google is enough, as it leaves the device available to claim.

3.5mm ftw and all that, but I doubt all the parents of teenagers with potentially vulnerable devices will have much luck convincing their kids to switch!

[–] postnataldrip@lemmy.world 20 points 4 weeks ago (6 children)

If you want to listen to their mic via bluetooth or whatever, yes. But there's also this:

Some devices also support Google's Find Hub network. This enables users to find their lost accessories using crowdsourced location reports from other Android devices. However, if an accessory has never been paired with an Android device, an attacker can add the accessory using their own Google account. This allows the attacker to track the user via the compromised accessory.

[–] postnataldrip@lemmy.world 5 points 1 month ago

Aussies could be a world superpower

[–] postnataldrip@lemmy.world 2 points 2 months ago

Booting on a schedule as others have suggested would be the simplest by far.

To answer as asked though, it's not something I've needed to do but it sounds like a VPN + IGMP proxy (I'm assuming you have a separate subnet for your VPN) might fit the bill.

Alternatively some kind of low power device (a Pi or something) that lives in the same subnet could make the WOL call locally, and you just need to find a way to trigger it. Could do it via a http call for example.

[–] postnataldrip@lemmy.world 6 points 2 months ago

NAL but I believe it being suspended means the fine is basically a threat. If they reoffend or fail to meet whatever conditions are set in that 30-day period, then the fine becomes payable.

[–] postnataldrip@lemmy.world 4 points 3 months ago

I'm guessing that would be if every muscle was being used for propulsion at any given time. You'd need to allow for heart and lungs, as well as face, neck, tail muscles that don't contribute to power output, plus legs don't provide continuous power as they need to make a return trip.

If we really wanted to optimise a dog for power:weight there are quite a few systems we could do away with. But it would likely result in a less floofy doggo, so it's obviously not an option.

[–] postnataldrip@lemmy.world 52 points 7 months ago (22 children)

I bet Video Chess is pretty shit as an LLM too.

Wish people would stop desperately looking for ways to write buzzword stories

[–] postnataldrip@lemmy.world 42 points 8 months ago (36 children)

There are times when pushing societal boundaries is fine. Imho driving a school bus isn't one of them.

[–] postnataldrip@lemmy.world 63 points 8 months ago* (last edited 8 months ago) (1 children)

"It crashed!"

"Yes but it did it all by itself!"

 
view more: next ›