• EngineerGaming@feddit.nl
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    It asked for your phone number? That is the thing that angered me the most. I wonder why you would share this rather than ask a waiter andsay you don’t have Whatsapp, for example.

    • ChaoticNeutralCzech@feddit.org
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      It’s easier to take precautions though. You probably don’t have an insulated USB port or throwaway host device but handling QR codes safely just takes basic tech and skill.

      Important advice:

      • Don’t use apps that auto-open URLs in QR codes when pointed at!
      • Make sure the app shows the full content of the QR code and lets you peruse it indefinitely before you open the link!
      • Know the structure of URLs and common pitfalls!

      Recommendations:

      • Be extra suspicious if there is no URL printed next to the code, or if the printed URL is different.
      • Use an open source reader app that does not resolve Punycode (Unicode in TLDs).
      • Strip any tracking parameters you spot before following any URLs.
      • Be careful if the QR code could have been easily tampered with (on a sticker over the original one, or on a plain sheet of paper)

      I think today’s generation’s equivalent is free Wi-Fi networks. Kids without mobile data in an area without an established public network will connect to just about any open one unless the SSID includes “LaserJet” or similar.

      • tiredofsametab@fedia.io
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        I keep meaning to look more into how qr codes work. I always wondered if there were possible attack vectors if a bad actor exploited a flaw in the decoding of the image. My mind went to a zip bomb for no apparent reason (a tiny file that unzips to a massive amount of data on disk)

        • ChaoticNeutralCzech@feddit.org
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          2 months ago

          That is very decoder-specific. The most common QR reader apps are the Camera app on iPhones and Google Lens for Android so you’ll want to target one of these (though Google Lens might be using cloud processing for that). There probably won’t be any exploits in the image processing part but you obviously can write arbitrary data (including ASCII control characters such as CR, LF, null) into the “data” part of the QR code, as the encoding mode and data length is stored in the first 4+(n*8) bits of where data would be instead of null byte termination. Normally, the data is then right-padded with repeating 0xEC11 (or not) and then error correction follows (number of bytes in the error-correction part is defined by the size and ECC mode indicated in another region).

      • Zagorath@aussie.zone
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Strip any tracking parameters you spot before following any URLs.

        If it’s one of these QR codes at a restaurant for ordering, the parameters could possibly be necessary to properly connect your order to your table, depending on how they’re set up.

      • krolden@lemmy.ml
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        WiFi and cellular networks as well. Using cellular data without some kind of tunneling for traffic/dns is nuts IMO.

  • NegativeInf@lemmy.world
    link
    fedilink
    arrow-up
    0
    ·
    2 months ago

    Absolute insanity.

    I would have abused this great and terrible power in just the same way he described. Random orders for random tables at random restaurants at random times in small quantities for as long as they aren’t protected. Just enough to be an inconvenience/awkward but not enough to raise alarms.

    And now I will check every QR code I scan at a restaurant.

    • Psychodelic@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      2 months ago

      That seems kinda fucked up. Why would you do something like that?

      I mean, I at least get fucking with people for money. Doing it for fun, not so much

      Also, anyone know what they meant with this line?

      I still loved my life so I didn’t want to use the Google custom search API.

      • NegativeInf@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        Real hackers don’t do it for money. They do it because they can or to prove a point. And I know. How “No true scotsman of me.”

        As to the quoted text, I assumed it was a reference to not getting more deeply involved in it that would cause legal issues for himself.

  • ElectricMachman@lemmy.sdf.org
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    Brilliant article - but it looks like it’s now been removed. Would be impressive if someone at Dotpe got wind in such a short space of time…

    • poVoq@slrpnk.netOP
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      Huh, it was still working when I posted it one hour ago… unlucky I guess 🤷‍♂️

  • Bezier@suppo.fi
    link
    fedilink
    arrow-up
    0
    ·
    edit-2
    2 months ago

    The main event here was pretty interesting, but I’d just like to say that

    It asked me for my name and Whatsapp mobile number.

    Why not just the mobile number. Do they also operate drive-ins that only accept BMWs?

    • Mountaineer@aussie.zone
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      In certain places like India, WhatsApp is the default means of communication for everyone.
      You can use it without phone data if you are on wifi, it supports better quality than sms for sending images, you can video chat with it, it’s cross platform, etc etc.

      What’s more amazing to me is that it’s not more popular in western countries.

      • Bezier@suppo.fi
        link
        fedilink
        arrow-up
        0
        ·
        2 months ago

        I know it’s dominant, but it just sucks. To go back to the previous analogy, Whatsapp should have a monopoly on communication as much as BMW should have a monopoly on transportation.

      • Wave@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Gonna be honest I’d much prefer Signal to take off in this regard. In the US iMessage is the closest widely excepted equivalent, but if I’m gonna do WiFi IM, I want to know it is 100% verifiably private. Otherwise I might as well be using SMS/MMS.

        • Mountaineer@aussie.zone
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          I agree and use Signal myself.
          But people like the extra features of WhatsApp like desktop/web clients with seamless history sync and all the other little things that WhatsApp provides.
          The average Joe doesn’t even think about security or privacy, they just know that the results of using WhatsApp are superior than using SMS.
          iMessage is a non starter everywhere out of the US, it just doesn’t have the market penetration.
          As an Australian, no one I know (many of whom own iPhones) talk about the blue-green bubble stuff.
          They recognise where the fault lies and simply don’t use the app.

          • Wave@lemmy.ml
            link
            fedilink
            English
            arrow-up
            0
            ·
            2 months ago

            I know the average Joe doesnt care about security/privacy but, ugh. Really wish we did. Society (at least in the US, where I am) might be a bit less shit if they did. I’m glad to hear that iMessage is a flash in the pan in other countries though, I dont understand why its such a big deal here, especially when Signal/WhatsApp exists and provides a similar seemless experience across more than one platform, but then again you’d hear me complaining about Meta if I lived anywhere else in the world so, really a lose lose for me :(

            • Mountaineer@aussie.zone
              link
              fedilink
              English
              arrow-up
              0
              ·
              2 months ago

              I have a friend group that insist on all events being planned through facebook.
              I’ve missed out on events in the past due to not taking part.
              It’s no longer a hill I wish to die on.

        • Zagorath@aussie.zone
          link
          fedilink
          arrow-up
          0
          ·
          2 months ago

          I have no idea what the law is in India, but if he got a “hacking” charge for this it would be a gross miscarriage of justice, considering he never once did anything resembling social engineering, brute forcing passwords, any sort of injection attack, or anything else that might actually be involved in hacking.

          However, assuming he never tried to reach out to the company themselves first (and I saw no indication in the article that he had), this is really quite a horrible irresponsible disclosure. It’s pretty obviously a significant leak of sensitive data—both customer and business data—and giving them 90 days to fix it before alerting the public to what you found is pretty basic security ethics.

          • ITGuyLevi@programming.dev
            link
            fedilink
            arrow-up
            0
            ·
            2 months ago

            Well there was that one part where he turned off his laptop after (not wanting to drop what he did here as the article was pulled), but I could totally see a company freaking out and going nuclear. That being said, I’m just looking through the FreedomGoggles that recently saw a “hacker” using F12 to compromise a bunch of teacher data. You know, their important sensitive data that was definitely not sent to their device where it could be seen by right clicking and hitting view source.

          • dylanmorgan@slrpnk.net
            link
            fedilink
            arrow-up
            0
            ·
            2 months ago

            I also don’t know the laws in India, but in the US nearly every major “hacking” case for decades has been a miscarriage of justice to some degree or another.

            Like Kevin Mitnick who simply figured out that a major early ISP was keeping customer payment information in plaintext on an internet-connected server.

            • thesmokingman@programming.dev
              link
              fedilink
              arrow-up
              0
              ·
              2 months ago

              That’s a huge misrepresentation of what Mitnick did and how the government mischarged him. He did a bunch of dumb stuff that was illegal. He was overcharged in very bad ways supporting ridiculous lies from the companies he broke into.