Skip to content

Piero Bosio Social Web Site Personale Logo Fediverso

Social Forum federato con il resto del mondo. Non contano le istanze, contano le persone

Ganz große Klasse!

Uncategorized
75 37 95

Gli ultimi otto messaggi ricevuti dalla Federazione
Post suggeriti
  • 0 Votes
    2 Posts
    13 Views
    Cory Doctorow spoke at the 39C3 on 28 Dec ’25. There, he described a way to finally escape the US-controlled, enshittified internet — by means that D. J. Trump accidentally opened access to. ‘Virtually every government ministry, every major corporation, every small business, every household in the world have locked themselves into a US-based, cloud-based service.’‘So this is the third bloc in the disenshittification army: not just digital rights hippies like me; not just entrepreneurs and economic development wonks rubbing their hands together at the thought of transforming American trillions into European billions; but also the national security hawks who are 100% justified in their extreme concern about their country’s reliance on American platforms that have been shown to be totally unreliable.’A brilliant, encouraging speech, worth every one of its 61 minutes. Thank you @pluralistic Via @_elena and @DataKnightmare⁠, thank you, too.https://pluralistic.net/2026/01/01/39c3/#the-new-coalition#Enshittification #Disenshittification #EU #Canada #USPol #Internet #39C3 #CoryDoctorow
  • 0 Votes
    1 Posts
    9 Views
    Apparently, there is a sticker version, too.#39c3ETA: https://punx.social/
  • 0 Votes
    1 Posts
    7 Views
    The "Bluetooth Headphone Jacking" talk at #39c3 was awesome, too. They reversed a popular SOC that powers Bluetooth earbuds and headphones.They found that (even without being paired to the headphone), they could dump flash and RAM from the device. Then they dumped a bunch of info from the device - e.g. the #Bluetooth address and "master" encryption keys used for the communication with paired devices (e.g. a #phone).Then they impersonated the headphone from their laptop and connected to the phone (pretending to be the headphone).The headphone (or the laptop impersonating the phone) has permissions to do some things on the phone, e.g. accept calls, increase/decrease volume, etc.Then they started recovering access a #WhatsApp account via some account recovery mechanisms. That required some one-time security key which would normally be delivered via SMS, but that could be delivered via phone call as a fallback option, too. Since the phone thought it was connected to the Bluetooth headphone, phone call audio would go to the laptop via Bluetooth.As the cherry on top, they escalated into the victim's #Amazon account.Scary shit. #YouCannotBeParanoidEnough #security
  • Winterrail 2025/26

    Uncategorized 39c3 interrail winterrail winterrail2526
    9
    0 Votes
    9 Posts
    10 Views
    @tommi You should have ended this toot with: "Trenitalia is terrible". Period.