this post was submitted on 12 Oct 2024
361 points (98.1% liked)

Technology

58677 readers
3905 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] theneverfox@pawb.social 0 points 1 day ago

There's different types of hacking. Finding and coding up an exploit? That takes skill

Then, they post it in a corner of the Internet somewhere to get appreciation for their achievement, or maybe even sell it on the dark web (or someone else sees it and packages it up in a state to sell/share)

Now, using the exploit? That's pretty easy. It requires some technical ability, but not much. It's just installing and configuring stuff, then using an app

So here's what I think happened. Someone found the exploit, and posted about it in a hacker community off the beaten path. One thing led to another, and somehow a group of edgelords get a hold of it. As a group, they manage to get it working, and act like edgelords

The original hacker might have been related, but real hackers are cautious or quickly caught - they probably solved the puzzle, maybe played with it a bit, then posted their findings and moved on to the next puzzle