• OutlierBlue@lemmy.ca
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    16
    ·
    2 months ago

    So the manufacturer isn’t spying on you, it just designed a product so someone else could hack you instead? That doesn’t make it sound any better.

    The end result is the same: be careful what cables you plug into your device.

    • kn33@lemmy.world
      link
      fedilink
      English
      arrow-up
      70
      ·
      2 months ago

      The end result is the same: be careful what cables you plug into your device.

      Sure, but this is clickbait at best. It’s not a revelation that this cable contains that hardware.

    • AnyOldName3@lemmy.world
      link
      fedilink
      English
      arrow-up
      23
      ·
      2 months ago

      The intended use for this kind of product is that you hire a company to break into your company, and then tell you how they did it so that criminals (or, if you’re someone like a defence contractor, foreign spies) can’t do the same thing later. Sometimes they’re also used by journalists to prove that the government or a company isn’t taking necessary precautions or by hobbyists at events where everyone’s aware that everyone else will try to break into their stuff. There’s typically vetting of anyone buying non-hobbyist quantities of anything, and it’s all equipment within theoretical reach of organised crime or state actors, so pentesters need to have access, too, or they can’t reasonably assess the real-world threat that’s posed.

    • webghost0101@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      13
      ·
      2 months ago

      There are plenty of hacking devices on the market equal or worse than this. The truth is you want these devices available in the public so people are award of them and nerds can learn how to protect against them.

      The malicious inclined wont care about legal availability and some tinkers will make them if not only for the technical challenge.

    • TimeSquirrel@kbin.melroy.org
      link
      fedilink
      arrow-up
      3
      ·
      2 months ago

      These sorts of tools and knowledge should be free and open, so people can test their own systems and learn how to defend against them. They aren’t inherently bad themselves. As with firearms, it’s all about what you do with it.

      Hiding a potential exploit from the general public does them no good.