HN2new | past | comments | ask | show | jobs | submit | jogu's commentslogin

Mitsubishi Group has a lot of companies, including a bank, so no the logo doesn't say anything about who donated it.

I like Barley tea as my go to caffeine free tea.


In the video at the end you can see it’s the former. They’re drawing a digital representation of the commands the emulator is sending to the “sewing machine”.


my bad - I read but didn't watch. okay now I want the latter


Jetson is such a confusing product and it's difficult to tell exactly what they're supporting. Looking at the image download page it seems to be only Orin and newer?

https://ubuntu.com/download/nvidia-jetson


Yeah. I have the Orin devkit


It can be fixed if the manufacturer releases a firmware update for the affected devices.


Sounds like you should have actually watched the “long ass video”.

It allows the pairing key to be exfiltrated from the compromised device and an external, attacker controlled device to perform any function the original device could. This includes retrieving the paired devices phone number, answering phone calls, and receiving the audio. They live demo hijacking a whatsapp account using this.


Neat. It appears my headphones have to be in pairing mode. Which is a very short window, at which point the attacker can impersonate your device. this allows him to answer phone calls for you or make phone calls, but you would notice right away. It’s not like cloning the audio and eves dropping. so yeah it’s a nothing burger.


Some devices are/were only vulnerable during the initial pairing but a key point from this talk was that most of these devices were vulnerable during normal use.

The RACE protocol could be accessed even if the device isn’t in pairing mode. Then once you have a target device’s key you can carry out the attack at anytime, when they’d be unlikely to notice.


If you have the target device key, you can impersonate the device later. But how do you get the device key in the real world? I would need to be in pairing mode for you to get it. Even if you did get it, then you can answer my calls if you are next to me, which in the real world is certainly noticeable.


> I would need to be in pairing mode for you to get it.

No, that doesn't seem to be the case.

> then you can answer my calls if you are next to me, which in the real world is certainly noticeable.

You may not notice if the call was answered automatically and you didn't have your device on you, and the call could be forwarded with acceptable latency so the speech wouldn't be in earshot. Or these days you could use an AI to generate voice and it would sound realistic.

Just because something isn't likely to affect ordinary citizens doesn't mean it isn't possible.


Important to note that usage of an Airoha chip doesn’t imply being vulnerable, so each device has to be checked individually.

It’s possible they weren’t vulnerable to begin with, it’s also possible they silently patched it.


Yeah, the passkey provider management is absolutely horrendous and is the biggest blocker to passkey adoption in my eyes. I have 3 different sources (iCloud keychain, Yubikey, and Enpass) and in the best case it's some extra clicks like you mention, in the worst case it just simply won't let me select the correct provider.

I've resigned to registering a passkey into all of my providers and just letting the most platform native option win for now.


My first time seeing Collapse OS as well, but I'm guessing the decision is based in attempting to contain complexity.

Seems like the author has a related projected Dusk OS that is more portable:

https://duskos.org/


I'm in a similar situation. I really wish there was a way to stop YouTube from suggesting me auto-dubbed videos.


You can use the YouTube No Translation add-on to automatically turn off the robodubs and translated titles:

https://youtube-no-translation.vercel.app/


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: