IllNess

joined 2 years ago
[–] IllNess 2 points 7 months ago (7 children)

Don't use Tor. If the FBI found ways to break it before, assume it could have other vulnerabilities to do it again.

[–] IllNess 6 points 7 months ago

That's the plan.

It starts with adult sites then it moves on to everything else.

This would allow tech companies to get more data and stop guessing who is behind a shared IP address.

[–] IllNess 7 points 7 months ago (10 children)

This shouldn't need to be said but use a VPN with these accounts.

[–] IllNess 49 points 7 months ago (1 children)

“The idea that data protection has any bearing on being filmed driving your car on a public road and committing traffic offences is ridiculous,” he said.

Yeah.

You know how you could avoid getting caught using your phone while you're driving? How about don't use your phone while you are driving.

[–] IllNess 5 points 7 months ago

We still do the first part but it'll be easier when they are consolidated together.

[–] IllNess 10 points 7 months ago

"Eat my gas" should be their slogan.

[–] IllNess 14 points 7 months ago (3 children)

This is interesting...

Lab grown meat have problem where they cannot create fat. So if this works, maybe this is the solution.

"So you're using this gas right now to cook your food and we're proposing that we would like to first make your food with— with that gas," said Kathleen Alexander, co-founder and CEO of Savor.

That doesn't sound appetizing... Lol.

[–] IllNess 4 points 7 months ago (1 children)

I seed but never created a torrent file. I wonder if there is a command to create a new hash to see if you can compare the old one with the new one. That way you can see if it truly is the same file.

[–] IllNess 2 points 7 months ago

"I'm in shape. Round is a shape too."

[–] IllNess 16 points 7 months ago

When internet was shut down in Egypt in 2011, people were able to report events to social media using dial up connections.

I'm not sure how relevant this in the US considering nearly all landlines now goes through ISPs anyway.

[–] IllNess 54 points 7 months ago (4 children)

Lets compare the amount of drugs that gets transported by cars vs bikes. If cars have transported more drugs then get rid of car lanes instead of bike lanes.

[–] IllNess 4 points 7 months ago

His idea of dangerous is scratching his precious truck, not people's lives. Hope that clears it up.

7
submitted 2 years ago by IllNess to c/securitynews
 
 

Pohl only found that out by accident, while working with a client's network. "When I got into the device in question, I thought: 'Hey, there's a username and password in here,'" he recalls.

At least the credentials weren't stored in clear text. But Pohl decompiled the Java class he guessed might have been responsible for the decryption, easily discovering an AES static key stored in the source code.

After a little bit of reverse engineering using CyberChef, "all of a sudden, out popped a clear text password. And I took that username and password that I got from the Dell Compellent software, went to the vCenter login, and I literally logged in and took over their entire environment."

It wasn't merely that Pohl possessed the same vCenter admin access as the Dell software, with the ability to observe, steal, or manipulate all of the data contained within. As he emphasized in a press release: "This key is the same for EVERY customer! If a criminal leverages this vulnerability, they could use it against any of Dell's customers."

view more: ‹ prev next ›