• 0 Posts
  • 76 Comments
Joined 2 years ago
cake
Cake day: August 4th, 2023

help-circle



  • Nah that was Windows XP, where the hard drive was not encrypted by default, and the password was stored in a hashed file on the computer itself, freely accessible via any boot stick. Actually cracking it still took some time (below 7 characters a few minutes, 7 about 1h, 8 chars up to 24h, longer… LONG). But if it was a common word, then a dictionary attack with a long enough word list (most word lists have like 400k words or so) would get it in seconds either.

    The funny thing with Windows XP was that since none of the data was encrypted, you could simply delete the password hash and set a flag in the registry and you would boot right into Windows with no password at all, and were then prompted to set a new password. That didn’t work since Windows 7 anymore.


  • You can buy a hardware keystroke recorder for a few bucks. Just plug it between keyboard and computer and it logs all inputs. Once they have the boot password (and maybe a bunch of others), installing malware and exfiltrating data is pretty straightforward. Doesn’t require a lick of IT knowledge either.

    Bit more challenging on a laptop without external keyboard, but there are hardware solutions as well, though they’d require tinkering with your device.

    Phones are harder to gain access to. Honestly if I wanted to get into your phone, I’d probably try to set up hidden cameras in spots where you are likely to enter your PIN (bed, toilet) somewhere under the ceiling and angled straight down. I’d probably try to switch the phone off as well any chance I got (long press the start button) so that you’d be forced to boot up and enter the PIN at any given opportunity to max my chances.

    Actually hacking secure boot / accessing data from encrypted drives is beyond casual hackers, unless you don’t regularly update your devices and there are some active exploits published.

    But seriously, low effort password sniffing is still the biggest vulnerability out there.







  • The developers of Lemmy also run lemmygrad.ml and lemmy.ml, the former being a hardcore communist anti-everything delusional conspiracy crapshoot of a platform, the latter a tiny bit more relaxed, but moderated/administered by a bunch of dicks that are essentially also tankies (= hardcore leftists) and Russia fans/apologists.

    They (the devs) recently asked for funding to support their work, and in doing so, disclosed that part of the funding would be used to run those two instances, thus giving users no alternative to support without cross-financing extremism.

    Piefed is developed independently and has none of those links to moronic ideologies.

    Piefed as a platform uses the same underlying protocol as lemmy, mastodon, etc. (Activity Hub), so users can seamlessly interact with one another.


  • There’s one near my house, and it has no mute button whatsoever. No buttons at all, in fact. You tap your card to the reader, then lift the pump of whichever variety you need, and that moment the ads start. With sound on full blast as well.

    I’ve left a negative google review and make sure to update it monthly so that it stays on top, and drive to another station quite a bit further off just to avoid this crapshoot.