@Slater450413@infosec.exchange avatar Slater450413 , to random

A friendly reminder to never trust manufacturers privacy protections.

I was recently attempting to get an external camera functioning, so I started polling various video devices sequentially to find out where it appeared and stumbled across a previously unknown (to me at least) camera device, right next to the regular camera that is not affected by the intentional privacy flap or "camera active" LED that comes built in.

I had always assumed this was just a light sensor and didn't think any further about it.

The bandwidth seems to drop dramatically when the other camera is activated by opening the privacy flap, causing more flickering.
This was visible IRL and wasn't just an artifact of recording it on my phone.
I deliberately put my finger over each camera one at a time to confirm the sources being projected.

A friend of mine suggested this may be related to Windows Hello functionality at a guess but still seems weird to not be affected by the privacy flap when its clearly capable of recording video.

dmidecode tells me this is a LENOVO Yoga 9 2-in-1 14ILL10 (P/N:83LC)

Command I used for anyone to replicate the finding. (I was on bog standard Kali, but I'm sure you'll figure out your device names if they change under other distros):
vlc v4l2:///dev/video0 -vv --v4l2-width=320 --v4l2-height=240 & vlc v4l2:///dev/video2 -vv --v4l2-width=320 --v4l2-height=240

Video showing the regular camera and the secondary sensor both providing video streams, the secondary continuing to work when the privacy flap is closed and activity LED off.

@opengenova@mastodon.uno avatar opengenova , to Informatica (Italy e non Italy) Italian

L’ si ribella al dominio : e europei sfidano , e , con la Francia che bandisce e dalla entro 2027, puntando su : e l’Italia? Intanto , agente open source virale, controlla il tuo PC (chat, email, script!) ma attenzione ai rischi . Google lascia trapelare : Desktop su con Android 16 pronto a rivoluzionare i notebook.

informatica@feddit.it icon Informatica (Italy e non Italy)

https://bit.ly/4qcv4f1

@rod2ik@mastodon.social avatar rod2ik , to random French
@h3artbl33d@exquisite.social avatar h3artbl33d , to random

PQC.

Post Quantum Cyber.

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@nh2600@defcon.social avatar nh2600 , to random

Don't forget that in 2 weeks is the of the month, which means that , 5th, is your next monthly @2600 meeting! 2600 Meetings always occur on the first Friday of each month.

If you're in New Hampshire, then please join us in Peterborough at Mi Jalisco, located at 19 Wilton Road at 7:00 PM Eastern time. https://nh2600.neocities.org for more info.

If you live elsewhere in the world & want to attend a local then check out https://2600.com/meetings to see where they're happening!

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@h4ckernews@mastodon.social avatar h4ckernews Bot , to random
@informatik@mas.to avatar informatik , to random German

Lohnt es sich auch in puncto IT-Sicherheit, mehr Offenheit zu wagen? Ist Open Source ein Treiber von – und wenn ja, unter welchen Voraussetzungen?

Darüber diskutieren nächste Woche auf der :
🔹 Luise Kranich vom @bsi
🔹 Gerald Walther von der @Cyberagentur
🔹 Dr. Daniel Gerber von der @OSBA
🔹 Jeanne Dillschneider MdB

Was sagt ihr? Kann die Nutzung von zu mehr IT-Sicherheit führen?

@h4ckernews@mastodon.social avatar h4ckernews Bot , to random

Far-right websites got hacked and defaced; 6.5 terabytes of data got leaked

https://ddosecrets.com/article/psyclone-media

@appassionato@mastodon.social avatar appassionato , to bookstodon group

Ethics And Policies For Cyber Operations A Nato Cooperative Cyber Defence Centre Of Excellence Initiative by Mariarosaria Taddeo, 2016

This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations (COs). It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace.

https://openlibrary.org/books/OL28249897M/Ethics_and_Policies_for_Cyber_Operations

bookstodon@a.gup.pe icon bookstodon group

ALT

At present, cybercriminals are not deploying #AI agents to hack at scale. But researchers have demonstrated that agents are capable of executing complex attacks. #cyber[...] ( techhub.social )

At present, cybercriminals are not deploying #AI agents to hack at scale. But researchers have demonstrated that agents are capable of executing complex attacks. #cyber #securityhttps://www.technologyreview.com/2025/04/04/1114228/cyberattacks-by-ai-agents-are-coming/

@destrosoft@pixelfed.social avatar destrosoft , to random
@cheryanne@aus.social avatar cheryanne , to random

If you are with Australian Super it is recommended that you check your accounts now.

https://www.abc.net.au/news/2025-04-04/superannuation-cyber-attack-rest-afsa/105137820

@destrosoft@pixelfed.social avatar destrosoft , to random

Bezwładność (wireframe) (Inertia (wireframe)), acrylic on canvas, 105 × 150cm, 2023.

One of the final works from my series "Digital Practices of Avoiding Painting." I modeled the characters, and the wireframe view always seemed interesting to me. The characters I created felt incredibly inert, defenseless, and hollow inside.

18+ @destrosoft@pixelfed.social avatar destrosoft , to random

Kontynuacja wielowiekowej tradycji malarstwa w przedstawianiu kobiecego ciała (w GTA) (The continuation of the centuries-old tradition of painting in depicting the female body (in GTA)), acrylic on canvas, 50 × 70 cm, 2022.

I think the title describes this painting well. I painted it based on a screenshot from GTA: San Andreas, which I took using the in-game camera while playing GTA as a child. Even back then, I had strange feelings about all of this.

@destrosoft@pixelfed.social avatar destrosoft , to random

Zawróć (Turn back), acrylic on canvas, 30 × 30cm, 2022.

A small work from the series "Digital Practices of Avoiding Painting". Please turn back.

@destrosoft@pixelfed.social avatar destrosoft , to random
@destrosoft@pixelfed.social avatar destrosoft , to random

control freak studio back catalogue, upcoming releases, remix and sound commissions ( music.control.org )

Check out my campaign to get your ears on my dark electronics back catalogue for free in solidarity and ways you can help me finalise a fair few projects this year including donate what you can commissions for remixes, soundtracks, game assets etc. ...

@aral@mastodon.ar.al avatar aral , to random

“Turning everyday objects into fragmentation grenades should be a crime, as it blurs the line between civilian and military technologies.

I fear that if we do not universally and swiftly condemn the practice of turning everyday gadgets into bombs, we risk legitimizing a military technology that can literally bring the front line of every conflict into your pocket, purse or home.”

https://social.treehouse.systems/@bunnie/113168200562238932

hsarfaraz ,
@hsarfaraz@fosstodon.org avatar

@aral the blurring of lines between civilian and military use of tech was mentioned along with other tools, tactics & procedures of malicious actors in the use of in Third Eye Legal Consultancy’s contributions to the OEWG. A need of for a binding legal instrument is pivotal to ensure & Stability in cyberspace.

@fulelo@journa.host avatar fulelo , to random

- Mass IT outage affects airlines, media and banks
https://www.bbc.com/news/articles/cv2g5lvwkl2o

fulelo OP ,
@fulelo@journa.host avatar

V Joe Tidy, BBC corr:
'Everything points to this being a issue. If it was a issue it would be even more widespread.

The irony here, of course, is that Crowdstrike is a cyber-security product, so designed to protect computer networks from outages.

In this case it looks like it was that software that’s led to these huge issues.'

@ajsadauskas@aus.social avatar ajsadauskas , to Technology

From now on, anyone who's not from New Zealand is banned from making a government ad about cybersecurity.

I'm sorry, but the Kiwis have nailed it:

https://youtu.be/6c3Edm8NdGs

technology@lemmy.ml icon Technology

@kubikpixel@chaos.social avatar kubikpixel , (edited ) to uBlockOrigin

The FBI advises AdBlocker because of attack vector from cybercriminals and that will mean quite a bit. I advise you to be careful which one you use, because some are also malware and I recommend ublockorigin@lemmy.ml icon uBlockOrigin .

🛡️ https://ublockorigin.com
👮 https://www.ic3.gov/Media/Y2022/PSA221221