• Chozo@fedia.io
      link
      fedilink
      arrow-up
      20
      ·
      2 days ago

      “Hacker” doesn’t always imply one acting with malicious intent.

      • Lost_My_Mind@lemmy.world
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        2
        ·
        2 days ago

        If the 90s taught me anything, it’s that hacking is done exclusively on monochrome green monitors, with dos. Except once they hack in, the monitor is full color, and somehow has access to every video camera on the planet. With the ability to enhsnce resolution seemingly to magical levels where you can see a clear reflection in someones pupil.

        ENHANCE!!!

        • brsrklf@jlai.lu
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 day ago

          Nah, they evolved way past that in the following decades.

          Sometimes when they’re in a hurry they create GUI interfaces using Visual Basic to track IP adresses.

          And sometimes, if they’re very good, a hacker can manually carve a virus in a piece of bone using fractal patterns. They can use that to hack the computer scanning the bone so it adds a zero in thresholds for CPU heat monitoring and make it instantly catch fire.

          • Lost_My_Mind@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            1 day ago

            Are you sure you’re a dancing bear? Are you related to the masturbating bear from Conan O Brian’s late night show in the 90s?

            • DancingBear@midwest.social
              link
              fedilink
              English
              arrow-up
              1
              ·
              14 hours ago

              Oh man I love Conan O’Brien, especially as a latch key kid whose ma worked shift work… arsenio hall and Conan O’Brien kick ass they made me feel so safe home alone falling asleep on the couch waiting for mom to come home 👍

    • Armok_the_bunny@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      2 days ago

      The risk is that some unknown hacker discovered this vulnerability and abused it before the researchers discovered and reported it. It sounds like the company has confirmed that didn’t happen, but they aren’t 100% trustworthy in that regard, simply because they might have missed something.

      • Auth@lemmy.world
        link
        fedilink
        English
        arrow-up
        9
        ·
        2 days ago

        yeah i know the risk, but the headline implies the data was exposed to a hacker who tried the password 123456 but thats not the case. A security researcher was investigating the application and accessed a test application with the password 123456 then found an API call which exposed the data and then he instantly reported it.