this post was submitted on 23 Sep 2024
205 points (97.7% liked)

Privacy

32177 readers
636 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
all 50 comments
sorted by: hot top controversial new old
[–] [email protected] 81 points 2 months ago (5 children)

scanning a random qr code has to be this generation's plugging in an unknown usb drive.

[–] captain_zavec 52 points 2 months ago (1 children)

I mean, unless somebody is burning browser zero days on random public QR codes I'm not too worried.

[–] [email protected] 6 points 2 months ago

Browser zero days are some of the most valuable exploits in existence, so I highly doubt it would happen in practice

[–] [email protected] 28 points 2 months ago* (last edited 1 month ago) (3 children)

It's easier to take precautions though. You probably don't have an insulated USB port or throwaway host device but handling QR codes safely just takes basic tech and skill.

Important advice:

  • Don't use apps that auto-open URLs in QR codes when pointed at!
  • Make sure the app shows the full content of the QR code and lets you peruse it indefinitely before you open the link!
  • Know the structure of URLs and common pitfalls!

Recommendations:

  • Be extra suspicious if there is no URL printed next to the code, or if the printed URL is different.
  • Use an open source reader app (most QR codes don't contain secrets but it's got permission to use either camera!) that does not resolve Punycode (Unicode in TLDs).
  • Strip any tracking parameters you spot before following any URLs.
  • Be careful if the QR code could have been easily tampered with (on a sticker over the original one, or on a plain sheet of paper inserted into a plastic wrap together with the rest)

I think today's generation's equivalent is free Wi-Fi networks. Kids without mobile data in an area without an established public network will connect to just about any open one unless the SSID includes "LaserJet" or similar.

[–] [email protected] 5 points 2 months ago (1 children)

Strip any tracking parameters you spot before following any URLs.

If it's one of these QR codes at a restaurant for ordering, the parameters could possibly be necessary to properly connect your order to your table, depending on how they're set up.

[–] [email protected] 1 points 2 months ago

Then it's not a tracking parameter of course.

[–] [email protected] 4 points 2 months ago

WiFi and cellular networks as well. Using cellular data without some kind of tunneling for traffic/dns is nuts IMO.

[–] [email protected] 2 points 2 months ago (1 children)

I keep meaning to look more into how qr codes work. I always wondered if there were possible attack vectors if a bad actor exploited a flaw in the decoding of the image. My mind went to a zip bomb for no apparent reason (a tiny file that unzips to a massive amount of data on disk)

[–] [email protected] 4 points 2 months ago* (last edited 2 months ago)

That is very decoder-specific. The most common QR reader apps are the Camera app on iPhones and Google Lens for Android so you'll want to target one of these (though Google Lens might be using cloud processing for that). There probably won't be any exploits in the image processing part but you obviously can write arbitrary data (including ASCII control characters such as CR, LF, null) into the "data" part of the QR code, as the encoding mode and data length is stored in the first 4+(n*8) bits of where data would be instead of null byte termination. Normally, the data is then right-padded with repeating 0xEC11 (or not) and then error correction follows (number of bytes in the error-correction part is defined by the size and ECC mode indicated in another region).

[–] [email protected] 8 points 2 months ago

You just don't open the link

[–] [email protected] 5 points 2 months ago

You would at least be able to examine the link first.

[–] [email protected] 3 points 2 months ago* (last edited 2 months ago)
[–] shaserlark 44 points 2 months ago (1 children)
[–] [email protected] 58 points 2 months ago (1 children)
[–] Quacksalber 14 points 2 months ago (2 children)

Probably smart to take it down. What he did could be construed as hacking.

[–] [email protected] 27 points 2 months ago (4 children)

I have no idea what the law is in India, but if he got a "hacking" charge for this it would be a gross miscarriage of justice, considering he never once did anything resembling social engineering, brute forcing passwords, any sort of injection attack, or anything else that might actually be involved in hacking.

However, assuming he never tried to reach out to the company themselves first (and I saw no indication in the article that he had), this is really quite a horrible irresponsible disclosure. It's pretty obviously a significant leak of sensitive data—both customer and business data—and giving them 90 days to fix it before alerting the public to what you found is pretty basic security ethics.

[–] [email protected] 10 points 2 months ago (1 children)

I also don’t know the laws in India, but in the US nearly every major “hacking” case for decades has been a miscarriage of justice to some degree or another.

Like Kevin Mitnick who simply figured out that a major early ISP was keeping customer payment information in plaintext on an internet-connected server.

[–] [email protected] 4 points 2 months ago

That’s a huge misrepresentation of what Mitnick did and how the government mischarged him. He did a bunch of dumb stuff that was illegal. He was overcharged in very bad ways supporting ridiculous lies from the companies he broke into.

[–] pandapoo 3 points 2 months ago* (last edited 2 months ago) (1 children)

Under US law, that would be considered hacking.

It is antiquated, and frequently abused by prosecutors, but legally speaking hacking is as simple as accessing any system you're not authorized to.

And even more so, he documents alterations and changes that he made to that system e.g. ordering a soup for a random table.

Again, only speaking for America, but this would be a textbook example of grayhat hacking, which could easily be prosecuted.

I'm not saying it should be illegal, or that I agree, just that it currently is.

[–] [email protected] 1 points 2 months ago (7 children)

A good lawyer in a case with a sensible well-informed judge could run a good case, since he's only actually making calls to an API that has not just been left open for anyone to access (which you could argue is implicit authorisation no different to how a store having unlocked doors is implicit invitation to enter the store), but has actually been explicitly invited to access by virtue of the site he was sent to in the QR code causing his browser to make requests to that API.

Admittedly, a competent prosecutor could also make a case that by changing the query parameters, he was then losing that explicit invitation, and could then try to pick apart the implicit argument.

Though it's all irrelevant, because there's a reason I said "miscarriage of justice" and not "incorrect application of the law". If the law did find someone guilty here, it would be an unjust law. That was my point.

load more comments (7 replies)
[–] [email protected] 3 points 2 months ago

Well there was that one part where he turned off his laptop after (not wanting to drop what he did here as the article was pulled), but I could totally see a company freaking out and going nuclear. That being said, I'm just looking through the FreedomGoggles that recently saw a "hacker" using F12 to compromise a bunch of teacher data. You know, their important sensitive data that was definitely not sent to their device where it could be seen by right clicking and hitting view source.

[–] [email protected] 1 points 2 months ago

Self-censorship working a little too well.

[–] [email protected] 26 points 2 months ago (1 children)

Absolute insanity.

I would have abused this great and terrible power in just the same way he described. Random orders for random tables at random restaurants at random times in small quantities for as long as they aren't protected. Just enough to be an inconvenience/awkward but not enough to raise alarms.

And now I will check every QR code I scan at a restaurant.

[–] [email protected] 2 points 2 months ago* (last edited 2 months ago) (3 children)

That seems kinda fucked up. Why would you do something like that?

I mean, I at least get fucking with people for money. Doing it for fun, not so much

Also, anyone know what they meant with this line?

I still loved my life so I didn't want to use the Google custom search API.

load more comments (3 replies)
[–] [email protected] 23 points 2 months ago (1 children)

I scanned the API calls to get all the details I needed. I did my thing and I was in.

Hackerman

[–] [email protected] 2 points 2 months ago (1 children)

I was hoping for the Mr robot guy

[–] [email protected] 2 points 2 months ago

I only trade in the finest, unadulterated, originals.

[–] [email protected] 15 points 2 months ago* (last edited 2 months ago) (1 children)

The main event here was pretty interesting, but I'd just like to say that

It asked me for my name and Whatsapp mobile number.

Why not just the mobile number. Do they also operate drive-ins that only accept BMWs?

[–] [email protected] 10 points 2 months ago (3 children)

In certain places like India, WhatsApp is the default means of communication for everyone.
You can use it without phone data if you are on wifi, it supports better quality than sms for sending images, you can video chat with it, it's cross platform, etc etc.

What's more amazing to me is that it's not more popular in western countries.

[–] [email protected] 8 points 2 months ago (1 children)

It's the most common communication tool for friends and family in much of europe

[–] [email protected] 4 points 2 months ago

I know it's dominant, but it just sucks. To go back to the previous analogy, Whatsapp should have a monopoly on communication as much as BMW should have a monopoly on transportation.

[–] [email protected] 15 points 2 months ago* (last edited 2 months ago)
[–] [email protected] 13 points 2 months ago (1 children)

error 404: 'Page not found'

[–] [email protected] 28 points 2 months ago

Has been taken down. See archived copy

[–] [email protected] 11 points 2 months ago (1 children)

Brilliant article - but it looks like it's now been removed. Would be impressive if someone at Dotpe got wind in such a short space of time...

[–] [email protected] 7 points 2 months ago

Huh, it was still working when I posted it one hour ago... unlucky I guess 🤷‍♂️

[–] [email protected] 4 points 2 months ago* (last edited 2 months ago)

It asked for your phone number? That is the thing that angered me the most. I wonder why you would share this rather than ask a waiter and say you don't have Whatsapp, for example.

[–] [email protected] 1 points 1 week ago

Whoa, I need to recover from reading this. Where to even begin?? Asks for a phone number? Nonetheless, but a WhatsApp phone number? Hmm, a red flag, but it's nothing compared with the rest of the post. A friend asked me maybe two weeks ago to help him make a QR code for a restaurant menu since I deal with them a lot for work (it's actually not that difficult, see here). The generator I use is likely the safest in the market, with all bells and whistles, and I always tell anyone who asks - check the generator carefully before making a QR code, especially for business and especially if you plan to print it. Read the reviews. Look for security features. Plus, many advertise free codes, but it turns out - not really (people create, print, and then two weeks later - hello, pay a subscription if you want your code to work again). And I thought this was bad. But what I read now escapes reality. A big thanks to those who posted the archived copy, by the way.