this post was submitted on 12 Oct 2024
363 points (98.1% liked)

Technology

59427 readers
4106 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] sbv@sh.itjust.works 56 points 1 month ago (6 children)

On May 24, the same day that Mr Swenson's device was hacked, a Deebot X2 went rogue, and chased its owner's dog around their Los Angeles home.

The robot was being steered from afar, with abusive comments coming through the speakers.

...

Late at night, an Ecovacs robot in El Paso started spewing racial slurs at its owner until he unplugged it.

The future is stupid.

[–] Dasus@lemmy.world 17 points 1 month ago (5 children)

These hackers are stupid.

I dint understand how you have the intelligence and patience to learn enough to hack one of these, but the go with some unoriginal racist bullshit.

Could've actually made it fun and original.

[–] theneverfox@pawb.social 0 points 1 month ago

There's different types of hacking. Finding and coding up an exploit? That takes skill

Then, they post it in a corner of the Internet somewhere to get appreciation for their achievement, or maybe even sell it on the dark web (or someone else sees it and packages it up in a state to sell/share)

Now, using the exploit? That's pretty easy. It requires some technical ability, but not much. It's just installing and configuring stuff, then using an app

So here's what I think happened. Someone found the exploit, and posted about it in a hacker community off the beaten path. One thing led to another, and somehow a group of edgelords get a hold of it. As a group, they manage to get it working, and act like edgelords

The original hacker might have been related, but real hackers are cautious or quickly caught - they probably solved the puzzle, maybe played with it a bit, then posted their findings and moved on to the next puzzle

load more comments (4 replies)
load more comments (4 replies)