A friendly reminder to never trust manufacturers privacy protections.
I was recently attempting to get an external camera functioning, so I started polling various video devices sequentially to find out where it appeared and stumbled across a previously unknown (to me at least) camera device, right next to the regular camera that is not affected by the intentional privacy flap or "camera active" LED that comes built in.
I had always assumed this was just a light sensor and didn't think any further about it.
The bandwidth seems to drop dramatically when the other camera is activated by opening the privacy flap, causing more flickering.
This was visible IRL and wasn't just an artifact of recording it on my phone.
I deliberately put my finger over each camera one at a time to confirm the sources being projected.
A friend of mine suggested this may be related to Windows Hello functionality at a guess but still seems weird to not be affected by the privacy flap when its clearly capable of recording video.
dmidecode tells me this is a LENOVO Yoga 9 2-in-1 14ILL10 (P/N:83LC)
Command I used for anyone to replicate the finding. (I was on bog standard Kali, but I'm sure you'll figure out your device names if they change under other distros):
vlc v4l2:///dev/video0 -vv --v4l2-width=320 --v4l2-height=240 & vlc v4l2:///dev/video2 -vv --v4l2-width=320 --v4l2-height=240
Don't forget that in 2 weeks is the #FirstFriday of the month, which means that #Friday, #December 5th, is your next monthly
@2600 meeting! 2600 Meetings always occur on the first Friday of each month.
If you're in New Hampshire, then please join us in Peterborough at Mi Jalisco, located at 19 Wilton Road at 7:00 PM Eastern time. https://nh2600.neocities.org for more info.
Lohnt es sich auch in puncto IT-Sicherheit, mehr Offenheit zu wagen? Ist Open Source ein Treiber von #Cybersecurity – und wenn ja, unter welchen Voraussetzungen?
Darüber diskutieren nächste Woche auf der #INFORMATIK25:
🔹 Luise Kranich vom
@bsi
🔹 Gerald Walther von der
@Cyberagentur
🔹 Dr. Daniel Gerber von der
@OSBA
🔹 Jeanne Dillschneider MdB
Was sagt ihr? Kann die Nutzung von #OpenSource zu mehr IT-Sicherheit führen?
Ethics And Policies For Cyber Operations A Nato Cooperative Cyber Defence Centre Of Excellence Initiative by Mariarosaria Taddeo, 2016
This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations (COs). It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state’s army to inflict disruption or damage to an adversary’s targets in or through cyberspace.
Written by world-leading philosophers, ethicists, policy-makers, and law and military experts, the essays cover such topics as the conceptual novelty of COs and the ethical problems that this engenders; the applicability of existing conceptual and regulatory frameworks to COs deployed in case of conflicts; the definition of deterrence strategies involving COs; and the analysis of models to foster cooperation in managing cyber crises.
Each essay is an invited contribution or a revised version of a paper originally presented at the workshop on Ethics and Policies for Cyber Warfare, organized by the NATO Cooperative Cyber Defence Centre of Excellence in collaboration with the University of Oxford.
The volume endorses a multi-disciplinary approach, as such it offers a comprehensive overview of the ethical, legal, and policy problems posed by COs and of the different approaches and methods that can be used to solve them. It will appeal to a wide readership, including ethicists, philosophers, military experts, strategy planners, and law- and policy-makers.
At present, cybercriminals are not deploying #AI agents to hack at scale. But researchers have demonstrated that agents are capable of executing complex attacks. #cyber #securityhttps://www.technologyreview.com/2025/04/04/1114228/cyberattacks-by-ai-agents-are-coming/
One of the final works from my series "Digital Practices of Avoiding Painting." I modeled the characters, and the wireframe view always seemed interesting to me. The characters I created felt incredibly inert, defenseless, and hollow inside.
Kontynuacja wielowiekowej tradycji malarstwa w przedstawianiu kobiecego ciała (w GTA) (The continuation of the centuries-old tradition of painting in depicting the female body (in GTA)), acrylic on canvas, 50 × 70 cm, 2022.
I think the title describes this painting well. I painted it based on a screenshot from GTA: San Andreas, which I took using the in-game camera while playing GTA as a child. Even back then, I had strange feelings about all of this.
Check out my campaign to get your ears on my dark electronics back catalogue for free in solidarity and ways you can help me finalise a fair few projects this year including donate what you can commissions for remixes, soundtracks, game assets etc. ...
“Turning everyday objects into fragmentation grenades should be a crime, as it blurs the line between civilian and military technologies.
I fear that if we do not universally and swiftly condemn the practice of turning everyday gadgets into bombs, we risk legitimizing a military technology that can literally bring the front line of every conflict into your pocket, purse or home.”
@aral the blurring of lines between civilian and military use of tech was mentioned along with other tools, tactics & procedures of malicious actors in the use of #ict in Third Eye Legal Consultancy’s contributions to the #UN#cyber OEWG. A need of for a binding legal instrument is pivotal to ensure #Peace#security & Stability in cyberspace.
The FBI advises AdBlocker because of attack vector from cybercriminals and that will mean quite a bit. I advise you to be careful which one you use, because some are also malware and I recommend uBlockOrigin.
At present, cybercriminals are not deploying #AI agents to hack at scale. But researchers have demonstrated that agents are capable of executing complex attacks. #cyber[...] ( techhub.social )
At present, cybercriminals are not deploying #AI agents to hack at scale. But researchers have demonstrated that agents are capable of executing complex attacks. #cyber #securityhttps://www.technologyreview.com/2025/04/04/1114228/cyberattacks-by-ai-agents-are-coming/
control freak studio back catalogue, upcoming releases, remix and sound commissions ( music.control.org )
Check out my campaign to get your ears on my dark electronics back catalogue for free in solidarity and ways you can help me finalise a fair few projects this year including donate what you can commissions for remixes, soundtracks, game assets etc. ...