Elephant0991

joined 2 years ago
[–] Elephant0991@lemmy.bleh.au 19 points 2 years ago* (last edited 2 years ago) (1 children)

Speaking about Windows PC.

  1. Not everybody thinks they need such security because it's their home computer.
  2. Enabling device encryption necessitates the backup of the encryption key (and backup of the data files); otherwise, you may lose all the contents when things go wrong (like the key disappears after an update). People who don't understand the tech may not know where their backup keys are.
  3. Windows Home encryption is a hassle since you don't have finer-grain control over the encryption, unlike Bitlocker on Windows Pro. This is the lamest scheme for Windows. You only get practical basic security with Windows Pro.
  4. Enabling system drive encryption may make your system backup/recovery harder or impossible in some configurations. Figuring this out may require some technical expertise.
[–] Elephant0991@lemmy.bleh.au 43 points 2 years ago (8 children)

Spokespeople for NCTA and pharmaceutical company Gilead said that they immediately paused their ad spending on X after CNN flagged their ads on the pro-Nazi account.

Alt-speak: we only care if the media report that our ad placements were next to questionable contents.

[–] Elephant0991@lemmy.bleh.au 9 points 2 years ago

Shoppers of Dell Australia's website who were buying a computer would see an offer for a Dell display with a lower price next to a higher price with a strikethrough line. That suggested to shoppers that the price they'd pay for the monitor if they added it to their cart now would be lower than the monitor's usual cost. But it turns out the strikethrough prices weren't the typical costs. Sometimes, the lower price was actually higher than what Dell Australia typically charged.

Don't believe in ads, folks. If prices are important for you, do you own research.

[–] Elephant0991@lemmy.bleh.au 19 points 2 years ago

Whatever happens on the inside of a robotaxi is generally visible on the outside to bystanders and other motorists, The Standard notes of the AV's "fishbowl-like" design.

"While [autonomous vehicles] will likely be monitored to deter passengers having sex or using drugs in them, and to prevent violence, such surveillance may be rapidly overcome, disabled or removed," the study said. "Private [autonomous vehicles] may also be put to commercial use, as it is just a small leap to imagine Amsterdam’s Red Light District ‘on the move.’"

Convenient meetups, plus the additional benefits for certain fetishes.

But don't worry, folks, we'll take this opportunity to put even more surveillance tech in for you to keep you safe and meanwhile, perfectly maintain your privacy. 🤪

[–] Elephant0991@lemmy.bleh.au 4 points 2 years ago
  • Canned fish. Nutritious (protein). Lots of energy (fat).

  • Bread. Don't need to cook. Probably kept until it's all eaten.

  • 7-11 sells ready-to-eat food packs. They maybe willing to heat it for the persons if it's a 7-11 rebranded packet.

  • Ramen noodle types. Assuming that they can get boiled water.

[–] Elephant0991@lemmy.bleh.au 3 points 2 years ago

Yeah, some source say that the raised examples have been fixed by the different LLMs since exposure. The problem is algorithmic, so if you can follow the research, you may be able to come up with other strings that cause a problem.

[–] Elephant0991@lemmy.bleh.au 1 points 2 years ago (1 children)

There did seem to be a controversy in March about whether or not the word should go.

[–] Elephant0991@lemmy.bleh.au 4 points 2 years ago

Haha, if you quickly skipped the "and people" part. Happen all the time. Brain cycles are expensive.

[–] Elephant0991@lemmy.bleh.au 6 points 2 years ago (1 children)

Those seem like questions for more research.

I bet it's more pernicious because it is easy to incorporate AI suggestions. If you do your own research, you may have to think a bit if the references/search results may be bad, and you still have to put the info in your own words so that you don't offend the copyright gods. With the AI help, well, the spellings are good, the sentences are perfectly formed, the information is plausible, it's probably not a straight-forward copy, why not just accept?

[–] Elephant0991@lemmy.bleh.au 5 points 2 years ago* (last edited 2 years ago)

I am being brainwashed by AI!

Here's the paper: https://dl.acm.org/doi/10.1145/3544548.3581196

Abstract

If large language models like GPT-3 preferably produce a particular point of view, they may influence people’s opinions on an unknown scale. This study investigates whether a language-model-powered writing assistant that generates some opinions more often than others impacts what users write – and what they think. In an online experiment, we asked participants (N=1,506) to write a post discussing whether social media is good for society. Treatment group participants used a language-model-powered writing assistant configured to argue that social media is good or bad for society. Participants then completed a social media attitude survey, and independent judges (N=500) evaluated the opinions expressed in their writing. Using the opinionated language model affected the opinions expressed in participants’ writing and shifted their opinions in the subsequent attitude survey. We discuss the wider implications of our results and argue that the opinions built into AI language technologies need to be monitored and engineered more carefully.

[–] Elephant0991@lemmy.bleh.au 5 points 2 years ago

OK. Then. I guess the summary would be like, the asteroid was more loose than we though, and we had no idea how the boulders got ejected from the surface because our impact.

 

News article: https://techcrunch.com/2023/08/10/belarus-hackers-target-foreign-diplomats/

News Summary

  • A hacking group with apparent links to the Belarusian government has been targeting foreign diplomats in the country for nearly 10 years.
  • The group, which ESET has dubbed MoustachedBouncer, has likely been hacking or at least targeting diplomats by intercepting their connections at the internet service provider (ISP) level, suggesting close collaboration with Belarus' government.
  • Since 2014, MoustachedBouncer has targeted at least four foreign embassies in Belarus: two European nations, one from South Asia, and another from Africa.
  • ESET first detected MoustachedBouncer in February 2022, days after Russia invaded Ukraine, with a cyberattack against specific diplomats in the embassy of a European country "somehow involved in the war."
  • The hacking group is able to trick the target's Windows operating system into believing it's connected to a network with a captive portal. The target is then redirected to a fake and malicious site masquerading as Windows Update, which warns the target that there are "critical system security updates that must be installed."
  • It's not clear how MoustachedBouncer can intercept and modify traffic, but ESET researchers believe it's because Belarusian ISPs are collaborating with the attacks, allowing the hackers to use a lawful intercept system similar to the one Russia deploys, known as SORM.
  • Once ESET researchers found the attack last February and analyzed the malware used, they were able to discover other attacks - the oldest dating back to 2014 - although there is no trace of them between 2014 and 2018.
  • MoustachedBouncer’s activity spans from 2014 to 2022 and the TTPs of the group have evolved over time.
[–] Elephant0991@lemmy.bleh.au 23 points 2 years ago (2 children)

Somehow, I found the lead scientist's statement and the associated news to be click-baiting. Right, you crash something into a composite rock, and expect no ejecta from it. That's pretty freaking believable. That's like, the most basic physics you can expect from it. This is just to grab your attention so we can get more funding (which they may deserve, even if this is irritating), folks.

 

Summary

  • Detroit woman wrongly arrested for carjacking and robbery due to facial recognition technology error.
  • Porsche Woodruff, 8 months pregnant, mistakenly identified as culprit based on outdated 2015 mug shot.
  • Surveillance footage did not match the identification, victim wrongly identified Woodruff from lineup based on the 2015 outdated photo.
  • Woodruff arrested, detained for 11 hours, charges later dismissed; she files lawsuit against Detroit.
  • Facial recognition technology's flaws in identifying women and people with dark skin highlighted.
  • Several US cities banned facial recognition; debate continues due to lobbying and crime concerns.
  • Law enforcement prioritized technology's output over visual evidence, raising questions about its integration.
  • ACLU Michigan involved; outcome of lawsuit uncertain, impact on law enforcement's tech use in question.
 

Summary

  • AnonAddy has rebranded as addy.io.
  • addy.io is a privacy-focused email service that allows you to create and manage email aliases. Aliases are temporary email addresses that forward to your real email address. This can be useful for protecting your privacy when signing up for websites or services that you don't trust.
  • The name change was motivated by a desire for a shorter, easier to understand and more recognizable name.
  • The service will remain exactly the same, but with more features.
  • There is a also a new logo.
  • The web application is now a SPA (single page application).
  • The API has also been updated.
  • There are a number of new features.
  • For most users, there is nothing they need to do.
  • All existing alias domains are staying the same. The new addy.io domain will be available to those on paid plans shortly.
  • If you use a hardware key for 2FA on your account, you will receive an email notification shortly with further information.

Edited based on comment from: @iso@lemy.lol

 

Summary

  • Scammers exploit Twitter's rebranding (transition to name "X") confusion for phishing.
  • Twitter Blue users targeted, offered migration to "X," but scammers gain account access.
  • Phishing emails seem genuine, appearing to come from x.com and passing the Security Policy Framework (SPF), and include deceptive authorization link, opening a legitimate API authorization screen.
  • Clicking link grants attackers control over victim's Twitter account settings and content.
  • Victims can block access by revoking app authorization in Twitter settings.
  • Twitter is aware and "working on a solution."

Article's Safety Recommendations (probably a bit generic and self-promotional)

  1. Being cautious with unfamiliar emails, especially attachments or links.
  2. Verifying URLs by hovering over them.
  3. Not sharing personal info on suspicious/unknown sites.
  4. Be careful with attachments and links.
  5. Using two-factor authentication (2FA) for account security.
  6. Keeping antivirus software updated to prevent malware.

Edited based on comment from: @incogtino@lemmy.zip

253
submitted 2 years ago* (last edited 2 years ago) by Elephant0991@lemmy.bleh.au to c/technology@lemmy.world
 

What are TunnelCrack vulnerabilities?

  • Two widespread security vulnerabilities in VPNs can be abused by an adversary to leak traffic outside the VPN tunnel.
  • The two vulnerabilities are called the LocalNet and ServerIP attack.

Summary of what VPNs are vulnerable to TunnelCrack

  • VPNs for iPhones, iPads, MacBooks, and macOS are extremely likely to be vulnerable
  • A majority of VPNs on Windows and Linux are vulnerable
  • Android is the most secure with roughly one-quarter of VPN apps being vulnerable.
  • Users generally decide which VPN protocol to adopt while creating the VPN tunnel, with common options being OpenVPN, WireGuard, or IPsec. As a result, the precise configuration of the client, and whether it is vulnerable to (variants of) our attacks, may depend on the chosen VPN server and protocol.

TunnelCrack Prevention

To prevent the attack, VPN clients should be updated to send all traffic through the VPN tunnel, except traffic generated by the VPN app itself.

How do the LocalNet and ServerIP attacks work?

LocalNet attack:

  • The adversary acts as a malicious Wi-Fi or Ethernet network and tricks the victim into connecting to it.

  • Once connected, the adversary assigns a public IP address and subnet to the victim.

  • The adversary then tells the victim that the local network is using this subnet, which means that IP addresses in this range are directly reachable in the local network. When the victim now visits a website with an IP address in this range, the web request will be sent outside the protected VPN tunnel.

  • 66+ VPNs on five platforms were tested and found that all VPN apps on iOS are vulnerable. Additionally, all but one VPN client on macOS is vulnerable, on Windows a large majority of VPNs are vulnerable, and on Linux more than one-third are vulnerable. Interestingly, VPN apps on Android are typically the most secure, with one-quarter being vulnerable to the LocalNet attack.

ServerIP attack:

  • The adversary abuses the observation that many VPNs don't encrypt traffic towards the IP address of the VPN server. This is done to avoid re-encryption of packets.

  • The adversary first spoofs the DNS reply for the VPN server to return the IP address of a website that they control. The victim will then connect with the VPN server at this IP address.

  • To assure the victim still successfully creates a VPN connection, the adversary redirects this traffic to the real VPN server.

  • While establishing the VPN connection, the victim will add a routing rule so that all traffic to the VPN server, in this case the spoofed IP address, is sent outside the VPN tunnel. When the victim now visits a website with the IP address of the VPN server, the web request is sent outside the protected VPN tunnel.

  • Built-in VPN clients of Windows, macOS, and iOS are vulnerable. Android 12 and higher is not affected. A significant number of Linux VPNs are also vulnerable.

 

Short summary: This is a sophisticated malware campaign that is targeting inexperienced cyber criminals with the goal of stealing their cryptocurrency and other sensitive information. The campaign is using malicious OpenBullet configuration files to distribute the malware, and it is targeting criminal communities that are known to use cryptocurrencies.

Other reading: https://thehackernews.com/2023/08/new-malware-campaign-targets.html

 

Summary

  • AMP is an open-source HTML framework that makes web content load faster on mobile devices.
  • Researchers have found a new phishing tactic that uses Google AMP to make URLs look trustworthy.
  • The tactic involves using the URL of a web page cached by the Google AMP Viewer. This URL looks similar to the original URL, but it is actually served from the google.com domain.
  • This gives the malicious website the legitimacy of the google.com domain, which can trick users into entering their personal information.
  • The researchers found that the Google AMP URLs have proven to be very successful at reaching users, even in environments protected by secure email gateways.
  • Along with using Google AMP URLs, the researchers also saw other techniques being used in phishing attacks, such as open redirects on trusted domains, chains of redirects linking the AMP URL to the malicious site, image-based phishing emails, and CAPTCHA services to disrupt automated analysis.
  • To avoid phishing attacks, it is important to not take things at face value for messages requiring urgent attention. It is also important to use a phishing-resistant password manager and a FIDO2 2FA device.
 

Summary

  • Google's proposal, Web Environment Integrity (WEI), aims to send tamper-proof information about a user's operating system and software to websites.
  • The information sent would help reduce ad fraud and enhance security, but it also raises concerns about user autonomy and control over devices.
  • The authors argue that implementing WEI could lead to websites blocking access for users not on approved systems and browsers.
  • They express worries about companies gaining more control over users' devices and the potential for abuse.
  • The authors emphasize that users should have the final say over what information their devices share.
  • Remote attestation tools, like WEI, might have their place in specific contexts but should not be implemented on the open web due to potential negative consequences.
  • The authors advocate for preserving user autonomy and the openness of the web, emphasizing that users should be the ultimate decision-makers about their devices.

Joke:

Two pieces of string walk into a bar. The first piece of string asks for a drink. The bartender says, “Get lost. We don’t serve pieces of string.”

The second string ties a knot in his middle and messes up his ends. Then he orders a drink.

The bartender says, “Hey, you aren’t a piece of string, are you?” The piece of string says, “Not me! I'm a frayed knot.”

 

Summary:

  • Generative AI will make it easier to produce disinformation that is tailored to specific audiences.
  • This means that disinformation campaigns will be more targeted and effective.
  • AI-powered disinformation could be used to target individuals with content that is specifically designed to manipulate them.
  • The Biden administration has taken some steps to address the threat of AI-powered disinformation, but it is unclear whether these steps will be enough.
  • It is important to be aware of the potential threats posed by AI-powered disinformation and to be critical of the content we see online.

Quotes:

“If I want to launch a disinformation campaign, I can fail 99 percent of the time. You fail all the time, but it doesn’t matter. Every once in a while, the QAnon gets through. Most of your campaigns can fail, but the ones that don’t can wreak havoc.”

“This is the classic story of the last 20 years: Unleash technology, invade everybody’s privacy, wreak havoc, become trillion-dollar-valuation companies, and then say, ‘Well, yeah, some bad stuff happened.' We’re sort of repeating the same mistakes, but now it’s supercharged because we’re releasing this stuff on the back of mobile devices, social media, and a mess that already exists.”

 

Summary

  • The article discusses the problem of non-consensual sharing of strangers' images and videos on social media platforms.
  • It highlights how people sometimes exploit strangers for viral content without considering the potential harm caused.
  • The author emphasizes the need for consent before posting someone's image or video and calls for a shift in societal norms regarding online privacy.
  • There is a French law that entitles child influencers to demand that platforms scrub all trace of them once they turn 16.
  • The article suggests that platforms could implement tools to obtain consent from strangers before posting content featuring them.
  • Ultimately, the author argues that treating strangers with respect and obtaining their consent should become the standard in online interactions to foster a more ethical and civil internet culture.
view more: ‹ prev next ›