• 0 Posts
  • 100 Comments
Joined 2 years ago
cake
Cake day: July 1st, 2023

help-circle



  • Nope.

    The reason you do react native is because it’s easier to hire react native devs. Further, there’s a plethora of react native libraries that make it easier to make UXes above other UX frameworks.

    The problem MS has is they have spent decades making platform locked UX frameworks because they were deathly afraid someone would use Linux instead of Windows.

    Browser tech won because every major platform needs a browser and basically no organization was investing in multiplatform UX libraries. The likes of both Microsoft and Apple are openly hostile to such frameworks (QT and GTK come to mind).






  • Just reread it and no, it’s not a BT vulnerability. The “erase flash” command is something that has to be done by software running outside the BT stack. You can even see that inside the slides. The UsbBluetooth software is connected to the device with the flawed bluetooth chipset.

    The vulnerability is that if you have this chipset and compromised software, someone can flash the chipset with compromised flash. They even say that it’s not an easy attack to pull off in the article.

    In general, though, physical access to the device’s USB or UART interface would be far riskier and a more realistic attack scenario.

    In otherwords, the attack is something that can only be pulled off if there’s also a security vulnerability within other parts of the hardware stack.


  • cogman@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    80
    arrow-down
    3
    ·
    4 months ago

    I just re-read the article and yes, you still need physical access.

    The exploit is one that bypasses OS protections to writing to the firmware. In otherwords, you need to get the device to run a malicious piece of code or exploit a vulnerability in already running code that also interacts with the bluetooth stack.

    The exploit, explicitly, is not one that can be carried out with a drive-by Bluetooth connection. You also need faulty software running on the device.



  • cogman@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    34
    arrow-down
    1
    ·
    4 months ago

    Security wise, unless you are being specifically targeted by someone, you are almost certainly fine. And if you are being specifically targeted, I think someone hacking your ESPs is the least of your worries. A malicious attacker that knows your physical location can do a lot more scary things than just spying through ESPs.


  • cogman@lemmy.worldtoTechnology@lemmy.world*Permanently Deleted*
    link
    fedilink
    English
    arrow-up
    180
    arrow-down
    16
    ·
    4 months ago

    You’re fine. This isn’t something that can be exploited over wifi. You literally need physical access to the device to exploit it as it’s commands over USB that allow flashing the chip.

    This is a security firm making everything sound scary because they want you to buy their testing device.


  • No, not possible.

    The closet we’ve seen are the zodiac killer’s scribbles and they lasted as long as they did because he made a mistake (and frankly because no security researcher was really trying).

    Modern cryptography works because it shuffles data around so much that it appears random. There’s simply no way to do those sorts of operations with just pen and paper.



  • I’m a different person. It appeared to me that you were lumping in all German citizens with Nazis which is why I made the post.

    I’m not defending Nazi supporters, even in the earliest stages. They j knowingly joined with the antisemites to try and push their own agendas. History tells us how that worked out.


  • cogman@lemmy.worldtoComic Strips@lemmy.worldFeminists
    link
    fedilink
    arrow-up
    2
    arrow-down
    3
    ·
    5 months ago

    Jews were citizens of Nazi Germany.

    Now, you might be able to make the case that early Nazi party members, before the rise of power, weren’t 100% antisemitic, they absolutely knew they were getting into bed with antisemites.

    After the rise in power started, Jewish sympathisers were purged from the party. Anyone in or supporting Nazis (which was a large portion of the population) knew what they were supporting.

    I’d just caution painting too broadly. That wasn’t all German citizens that supported the Nazi movement. It was also a brutal regime that stomped out detractors. German media of the era was highly controlled. It’d paint a false picture of the amount of support. True dissent was a dangerous position to publicly take.


  • Yup. What are they actually advocating for? What are their true core beliefs?

    It should also be noted that there are groups you can control your membership of (political parties, religions) and groups you are forced into (ethnicity, sexuality). The group you choose to join speaks far more about how terrible or good you are. The worst groups and people are those that attack people based on groups they are forced into, bigots and fascists.