u/lukmly013 💾 (lemmy.sdf.org)

I like computers, trains, space, radio-related everything and a bunch of other tech related stuff. User of GNU+Linux.
I am also dumb and worthless.
My laptop is ThinkPad L390y running Arch.
I own RTL-SDRv3 and RSP1 clone.

SDF Unix shell username: user224

  • 54 Posts
  • 1.57K Comments
Joined 3 years ago
cake
Cake day: June 17th, 2023

help-circle



  • This was the reason I stopped consuming it. I am not against porn, I like it, but verifying it is basically impossible. The issues usually boil down to money, same as usual.
    Could be someone being forced by an individual.
    Could be someone being forced by society (sex work as only way to afford college/healthcare/feeding a kid etc. even though the person feels being destroyed by it).
    Could be private recordings posted as revenge.
    You can’t really know.
    Of course that’s a problem with other professions too, but all that can be done under capitalism is harm reduction. Similar to not buying from Nestle.

    I just tried to think of what I can get absolutely ethically. Nothing. Even when thinking of vegetables directly from a farmer, dig in, and pesticides. How do they affect the environment, how were they produced, what happens to packaging. Nothing is 100% ethical. All I can do is try to avoid the worst or unnecessary.



  • I achieve the same by disabling VoLTE and VoWiFi and setting the phone to LTE only in *#*#4636#*#*.

    I love these service menus. *#*#3646633#*#* has so much stuff to permanently screw up on some MediaTeks. But also some useful ones like selection of frequency bands, or even specific frequency and cell id.
    But yeah, some settings can persist factory reset, and some may even be illegal like Tx tests (verified that it does transmit garbage on selected frequency with SDR) or IMEI change. Not all settings are on all devices, and they may even be partially broken.

    But yeah, these settings are don’t touch it for the most part (some are just huge lists of undocumented variables). Some don’t even seem to be resettable from the menu, I mean menus where you select one option, but by default they are unset. And the band mode selection on Moto G54 5G was… interesting. Rather than a nice selection menu, you can type in a number and select to add or remove it from a vector variable for 4G and 5G. Of course, nowhere does it list valid options or give a reset button.

    And lastly a thing that serves me as a warning for future, when I was playing around with a leaked service program for some Realtek Ethernet adapter, I found out what eFuse memory is. There is no going back.













  • Brute-forcing would take some bit of time. If the 6 digit code, 3 combinations of which are likely valid at a time becomes your only factor, you’ve already lost. Long randomly generated combinations are unrealistic to brute-force. For now at least.

    And here’s a screenshot from when I brute-forced the 2FA to my Lemmy account because I trusted the wrong app (Cisco Duo and its backups without version control wiping everything after turning on older device):
    6 digits isn’t much.

    Also I hate how it’s implemented everywhere. We figured out that telling someone whether the password or username is incorrect is a bad thing, so now we do “username or password incorrect”. But what about 2FA? Username is easy to get if targeting a specific person.
    If you can get to 2FA, you know the password was correct. That’s the case basically everywhere. Then it’s just 6 digits to guess. And typically you also only get notified about logins when successful. Too late at that point.
    My wish would be to take both password and 2FA code at once, and just return “password or 2FA invalid” if one or both of them are wrong.




  • I don’t follow what you’re trying to say here. (The last 2 sentences contradict in my mind)

    Anyway, phone vs this tomfoolery, it might not be more/less secure, just different.
    What’s on paper is all there will be, as it doesn’t include the secret for generating additional codes.
    Phone has that, but also has a screen lock. Whether that is easy to bypass will depend on environment, but after the first unlock, it is at least realistic.
    Plus you have people like my father who go by “no lock, nothing to hide”.

    For immediate exploit, paper looses.
    For later persistent exploitation, phone looses.

    Also, no one’s going to have endless scrolls of codes like this. 2 pages for less than 4 hours. Round that up to 2 hours per page, that would be 12 pages per day, 360 pages per month, 4,380 pages per year.
    I had to do this, because it was a requirement (they even recommended to print out the password). Actually, they didn’t mention 2FA, just to print out the password (and no use of personal devices). This is the best I could do given the environment.