this post was submitted on 12 Oct 2024
363 points (98.1% liked)
Technology
59080 readers
3819 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
...
The future is stupid.
These hackers are stupid.
I dint understand how you have the intelligence and patience to learn enough to hack one of these, but the go with some unoriginal racist bullshit.
Could've actually made it fun and original.
"Come with me if you want to live"
Yum Yum Thrash, I love thrash
I’ve no idea how they hacked. But most likely the vulnerability was a mistake the vacuum cleaner manufacturer did, after using second tier software to “save costs”. And they probably skimped on paying the coders, if any
Most likely someone more sophisticated found the exploit, tried to get a bug bounty , was declined by the penny pinching company, and they posted to a place people like your comment inhabit.
If I’m right, this is only the start of problems with this cleaner, because it will happen over and over?
I’m sorry Dave, I can’t do that
There's different types of hacking. Finding and coding up an exploit? That takes skill
Then, they post it in a corner of the Internet somewhere to get appreciation for their achievement, or maybe even sell it on the dark web (or someone else sees it and packages it up in a state to sell/share)
Now, using the exploit? That's pretty easy. It requires some technical ability, but not much. It's just installing and configuring stuff, then using an app
So here's what I think happened. Someone found the exploit, and posted about it in a hacker community off the beaten path. One thing led to another, and somehow a group of edgelords get a hold of it. As a group, they manage to get it working, and act like edgelords
The original hacker might have been related, but real hackers are cautious or quickly caught - they probably solved the puzzle, maybe played with it a bit, then posted their findings and moved on to the next puzzle