this post was submitted on 18 May 2025
465 points (97.0% liked)

Technology

70249 readers
3603 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 14 points 3 days ago (1 children)

You are forgetting targeted attacks. A blind attack would pretty much not have much of an effect indeed, however if the attacker knows the machine, then it's easy for the attackers to exploit these vulnerability if left "out in the open", and cause havoc, possibly create a lot of damages or leech informations pumped into those machines via old Windows installations.

[–] [email protected] 5 points 3 days ago (1 children)

For a business sure.

You wanna hack my dnd campaign and some pictures of my cock? Sure whatever dude. All financial and important shit goes through my phone anyway and that's likely to be hacked from the institutions I use.

[–] [email protected] 6 points 3 days ago (1 children)

They'll infect it and make it part of their DDoS bot swarm.

[–] [email protected] -3 points 3 days ago (1 children)

While that is awful and sucks. Again, probably won't really target me

If China or America use my machine as a member of their DDoS bot swarm likely I probably couldn't even fight back as much as I'd like. Either one of those countries could have backdoor bullshit into any system you think of.

If it is a nefarious third party maybe I want them to use my computer to attack the financial system of these capitalist regimes or to harm the infrastructure of an oppressive government.

Again, have my cock and dnd campaign. If my system runs slow and annoys me guess I'll deal with it. They already will get my information from the millions of sources compiling and collecting it.

I dunno doesn't really make me shake in my boots

[–] [email protected] 4 points 3 days ago

This is short-sighted. It also reeks of "Fuck you, I got mine!" I know that's not your intention. I just think you haven't thought super hard about it. I was the same with privacy concerns.

So let me throw some edge cases at you.

You remember the network time protocol vulnerability that was used to power botnets for a little bit? Well, until everyone upgraded their shit, service providers had to just block IP ranges of compromised machines until enough machines in that block stopped DDoS'ing them.

So what happens when some script kiddy pays for time on the botnet, which includes your box, to smash Wizards while you're trying to look things up? Or what if someone uses your box as a jump box to go attack some giant corporation, and shit gets traced back to you? Or what if someone decides you're the unlucky one where their whole goal is to dominate your entire home network, and they get your phone when it's on your home wifi?