• Chozo@fedia.io
      link
      fedilink
      arrow-up
      19
      ·
      15 hours ago

      “Hacker” doesn’t always imply one acting with malicious intent.

      • Lost_My_Mind@lemmy.world
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        2
        ·
        15 hours ago

        If the 90s taught me anything, it’s that hacking is done exclusively on monochrome green monitors, with dos. Except once they hack in, the monitor is full color, and somehow has access to every video camera on the planet. With the ability to enhsnce resolution seemingly to magical levels where you can see a clear reflection in someones pupil.

        ENHANCE!!!

        • brsrklf@jlai.lu
          link
          fedilink
          English
          arrow-up
          3
          ·
          13 hours ago

          Nah, they evolved way past that in the following decades.

          Sometimes when they’re in a hurry they create GUI interfaces using Visual Basic to track IP adresses.

          And sometimes, if they’re very good, a hacker can manually carve a virus in a piece of bone using fractal patterns. They can use that to hack the computer scanning the bone so it adds a zero in thresholds for CPU heat monitoring and make it instantly catch fire.

          • Lost_My_Mind@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            12 hours ago

            Are you sure you’re a dancing bear? Are you related to the masturbating bear from Conan O Brian’s late night show in the 90s?

    • Armok_the_bunny@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      16 hours ago

      The risk is that some unknown hacker discovered this vulnerability and abused it before the researchers discovered and reported it. It sounds like the company has confirmed that didn’t happen, but they aren’t 100% trustworthy in that regard, simply because they might have missed something.

      • Auth@lemmy.world
        link
        fedilink
        English
        arrow-up
        7
        ·
        15 hours ago

        yeah i know the risk, but the headline implies the data was exposed to a hacker who tried the password 123456 but thats not the case. A security researcher was investigating the application and accessed a test application with the password 123456 then found an API call which exposed the data and then he instantly reported it.