Hacker Newsnew | past | comments | ask | show | jobs | submit | monai's commentslogin

> Next level of dystopia: cellular modems becoming so cheap that every TV, fridge and washing machine comes with one that connects it to the Internet whether you like it or not.

That's already a reality with cars in Europe.


I also don't like this precedent, but I do still feel cars are quite different. You need a license to drive a car on public roads. The car needs lots of certifications. You need an insurance. You need to prominently display your (your car's) ID for all to see. If you make mistakes while operating a car, the police can stop you and the state can take away your right to drive a car.

This makes it all very different from a gadget you use for entertainment in your own home.


Yeah I agree obviously spyware in cars is way greater threat than one in a TV.


Just to be clear to anyone reading - those SIMs have one purpose only - to automatically call emergency services if you crash.


It’s naive to think that this is a) the only current use

Almost everything ever introduced with good intentions gets perverted into something else

Traffic cameras, facial recognition, phone GPS, social media - all can and are used against you in one way shape or form

I’m not saying we shouldn’t have any of those things - I’m saying just open your eyes because e sims are no different


Over twenty years ago there came a mandate that all places with many people gathers (both residential and commercial housing) should have a EN 54‑21 compliant alarm transmitter to automatically notify authorities in case of a fire.

I'm afraid that we are crying wolf right now and are undermining our efforts to permanently shut down Chat Control and the likes when we complain about these efforts with a history of not being misused.


Do they need a SIM to do an eCall? I'd think not because after all it is a semi-regular emergency call.

So if the car has a SIM it probably could be removed to neutralize it without interfering with the eCall. But eSIMs might be a different problem...


For now...?


You can transmit arbitrary data in certain steps of the passport reading process. The possibility of disruption depends on whether the reading system has bugs exploitable by the incoming data.

I've seen crashes in PKCS#11 drivers when reading cards with malformed data. So, the possibility, in theory, is always there.


these questions kill the vibe.


Reading story after story about big corporations abusing single/small group opensource developers, I think we need a license that, otherwise permissive, explicitly denies the use of the code for companies that took VC money or are worth a billion or more.


Absolutely not. Time Machine is just a SAMBA share with a nice UI on the client side. If the backup directory gets encrypted, all the versions of your files will also be encrypted.


There is a different opinion here:

https://discussions.apple.com/thread/8282686

Not sure what to make of it.

Is it possible to reach the server side of the Time Machine from the Mac itself? Has such a breach been demonstrated?


My Time Machine server doesn’t run an Apple OS. Someone would have to compromise my laptop and then pivot to separately attack my NAS. A state level actor could probably do that. The people running spray-and-pray ransomware ops almost surely couldn’t, or at least wouldn’t bother.


According to Darknet Diaries there are gangs that focus on backup server first, because with backups in place ransomware is not as effective. There are examples of backup software companies being compromised to get to their clients.

This is for attacks against bug companies. But maybe it's just a matter of time before "ordinary" ransomware is updated with destroy-backups function.


But to come back to the original question, is there any evidence against Apple Time Machine being secure?


Afaik, my colleague has a setup with regular Apple hardware and software.


The generated images look too flat and too sharp, giving an aged look. No one takes screenshots programmatically anymore. Consider revitalizing the output by adding RGB pixelation and a moire pattern filter to look like it was taken from a real monitor with a phone camera.


One of the Osmocom projects[0] does precisely that.

[0] https://osmocom.org/projects/osmo-remsim/wiki


mitmproxy is a great tool, but it lacks upstream certificate lookup and attributes transfer to a generated host certificate. For example, Charles does that. Some applications perform attribute inspection to detect MITM proxies, namely Spotify. Are you planning to implement this feature? Or maybe you already did it in version 7?


mitmproxy does lookup the upstream certificate by default, but at the moment we only transfer common name, subject alternative names and (new) organization name. The good news is that with version 7 it's very easy to add more here, I'd be more than happy to accept contributions. :)


Good news indeed! I tried to contribute 1–2 years ago and quickly realized that such a feature would require a substantial rewrite after a quick code inspection.


If you (or anyone else reading this) is interested, please do reach out on GitHub or our dev Slack. Happy to help you get started. :)



Yes, exactly!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: