this post was submitted on 08 May 2022
19 points (100.0% liked)
Asklemmy
43831 readers
787 users here now
A loosely moderated place to ask open-ended questions
Search asklemmy ๐
If your post meets the following criteria, it's welcome here!
- Open-ended question
- Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
- Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
- Not ad nauseam inducing: please make sure it is a question that would be new to most members
- An actual topic of discussion
Looking for support?
Looking for a community?
- Lemmyverse: community search
- sub.rehab: maps old subreddits to fediverse options, marks official as such
- !lemmy411@lemmy.ca: a community for finding communities
~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
i unfortunately don't have the link on hand, but i once saw this video of a pentesting team doing data exfiltration with qr codes. they converted the file to base64, split it into chunks that would be easy to scan on a phone, converted the base64 to a qr code, and took a video with their phone to reassemble later.
I once saw a demonstration when qr codes were new where they actually made video qr codes. It was like a modem but with video instead of audio. I don't recall the bitrate but it was high enough to be useful.
(It was used to demonstrate exfiltrating from an airgapped computer)