this post was submitted on 20 Feb 2025
208 points (99.1% liked)

Technology

63009 readers
3424 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Swapping QR codes in group invites and artillery targeting are latest ploys.

top 12 comments
sorted by: hot top controversial new old
[–] TheHobbyist@lemmy.zip 56 points 1 day ago (2 children)

It seems Signal has already pushed out a fix for this, which was abusing the QR codes to actually link a device when it was presenting itself as a way to join a group.

Paywalled: https://www.wired.com/story/russia-signal-qr-code-phishing-attack/

[–] notabot@lemm.ee 19 points 1 day ago

What I find particularly concerning is that the were able to "hide javascript commands that link the victim's phone to a new device" in the payload of a qr-code. I can't see any valid use for javascript in the group joining process, I would expect the code to just be a signal URI with the relevant group ID, so is there sone external javascript interface being exposed?

[–] latenightnoir@lemmy.world 17 points 1 day ago (2 children)

Back to pen and paper it is! Start feeding the pigeons, everyone!

[–] einkorn@feddit.org 14 points 1 day ago (1 children)
[–] absGeekNZ@lemmy.nz 11 points 1 day ago (1 children)

With 1.5TB capacity micro sd cards available, a pigeon could probably deliver 12-18TB.

[–] latenightnoir@lemmy.world 10 points 1 day ago* (last edited 1 day ago)

This is the way.

Edit: can we also give'em tiny cyberpunk shades and stuff?

[–] chaosCruiser@futurology.today 7 points 1 day ago (4 children)

Message in a bottle is the way to go.

If hackers don’t know where the bottle is floating, they can’t read the message. It’s also completely disconnected from the Internet, further enhancing the already robust security. This protocol also supports all encryption methods you can fit inside the bottle. There’s no central authority, no servers, no licenses, and no EULAs to accept without reading.

The only bottlenecks are bandwidth, packet loss, and the physical dimensions of the glass container.

[–] southsamurai@sh.itjust.works 4 points 21 hours ago

You forgot one bottleneck. The bottleneck.

[–] AutistoMephisto@lemmy.world 3 points 22 hours ago* (last edited 21 hours ago)

For the landlocked, may I recommend the Dead Drop Protocol? Leave the message in a place that everyone knows about, but only the intended recipients knows a message is there to be read. Like the Message in a Bottle, it supports all encryption methods and is disconnected from the Internet.

There are a couple drawbacks, though. For one, unless you are watching the drop point, you have no way of knowing whether your message made it to the intended recipient or if it was intercepted. Vice versa, if you are the intended recipient of a dropped message, the only guarantee you have that the message is authentic is if the message uses a self-authenticating encryption method. Also, there is a potential that any drop point you use may be under surveillance, so make sure to not use the same drop point too often.

[–] joshcodes@programming.dev 5 points 1 day ago

Reliance on security by obscurity is unacceptable, except when the obscurity method is the oceans entire fucking surface area.

[–] Fantabread@lemm.ee 5 points 1 day ago

And the actual neck of the bottle.