[-] [email protected] 16 points 7 months ago

Watching the video and the head movement all I see is the Balenciaga ai meme

[-] [email protected] 17 points 8 months ago

I've been downloading tons of my Spotify music using spotdl and sticking it on Plex, which kinda accomplishes most of what you want. I then organize it with lidarr. Spotdl doesn't actually download from Spotify but it uses Spotify metadata to tag files after matching with and downloading from YouTube music, it might just use youtube-dl/p under the hood but being able to give it a Spotify playlist, artist, or album url from Spotify makes it super convenient. For some artists I just download the entire artist in one go.

[-] [email protected] 34 points 8 months ago

Imo the best pushback is to leave and make twitter irrelevant

[-] [email protected] 15 points 8 months ago

I believe Louis Rossmann said that giving a single dollar directly to a creator is more than a lifetime of watching their ads. Premium I think is really good comparatively but that's only because ads pay so little.

(https://youtu.be/4Q3ZXQZZlcE?t=55 is where he says this according to his cpm)

[-] [email protected] 21 points 8 months ago

For this reason I hope the element X rewrite also replaces element on desktop eventually. The element X beta android app is so much snappier than element with the new sliding sync, it's supposedly 6000x faster but it just feels on par with signal or any other performant app, not being impacted by how many rooms you're in or how big those rooms are anymore.

[-] [email protected] 30 points 8 months ago

I recently started ripping all my Spotify playlists using spotdl to put them on my Plex. Spotdl doesn't actually download from Spotify but uses it as a source for the metadata to tag the files but it gets the audio by matching to YouTube music and downloading from there. From there I import to lidarr for renaming / organization.

[-] [email protected] 25 points 8 months ago

It's worth noting that if you use privacy for free trials, they limit you to 3 cards linked to the same "merchant" (detected by the first transaction that goes through). After 3 cards you have to contact support to reset the limit for that merchant, so the single transaction cards are only good if you never want to shop there again because they immediately burn 1 use out of the limit.

[-] [email protected] 25 points 9 months ago

The official newpipe isn't on the play store because it breaks their terms of service, which makes sense considering 2 of the 3 "newpipes" on there are just completely different apps using the name and logo of newpipe. The third is actually newpipe but with loads of ads added, not sure how long it'll last before Google nukes it.

But yeah for newpipe just get the offical ad free and open source version from TeamNewPipe on GitHub or on F-Droid in the main repo. Or if you want newpipe with no ads and also with sponsorblock, you want to get it from polymorphicshade on GitHub or through F-Droid with the Izzyondroid repo.

[-] [email protected] 18 points 10 months ago

Imo calling his channel satire for his use of comedy is akin to calling TechLinked satire because of their use of comedic quips, heckler, and goofy quick bits transitions. Satire implies a level of irony or insincerity, which I don't think code report falls under. His videos might be comedic but the topics covered are serious and factual.

[-] [email protected] 54 points 11 months ago

Article text:

Teens Hacked Boston Subway’s CharlieCard to Get Infinite Free Rides—and This Time Nobody Got Sued Andy Greenberg 8 - 11 minutes

In early August of 2008, almost exactly 15 years ago, the Defcon hacker conference in Las Vegas was hit with one of the worst scandals in its history. Just before a group of MIT students planned to give a talk at the conference about a method they’d found to get free rides on Boston’s subway system—known as the Massachusetts Bay Transit Authority—the MBTA sued them and obtained a restraining order to prevent them from speaking. The talk was canceled, but not before the hackers’ slides were widely distributed to conference attendees and published online.

In the summer of 2021, 15-year-olds Matty Harris and Zachary Bertocchi were riding the Boston subway when Harris told Bertocchi about a Wikipedia article he’d read that mentioned this moment in hacker history. The two teenagers, both students at Medford Vocational Technical High School in Boston, began musing about whether they could replicate the MIT hackers’ work, and maybe even get free subway rides.

They figured it had to be impossible. “We assumed that because that was more than a decade earlier, and it had got heavy publicity, that they would have fixed it,” Harris says.

Bertocchi skips to the end of the story: “They didn’t.”

Four young people posing together

The Boston subway hackers (from left to right) Scott Campbell, 16; Noah Gibson, 17; Matty Harris, 17; and Zack Bertocchi, 17.Photograph: Roger Kisby

Now, after two years of work, that pair of teens and two fellow hacker friends, Noah Gibson and Scott Campbell, have presented the results of their research at the Defcon hacker conference in Las Vegas. In fact, they not only replicated the MIT hackers’ 2008 tricks, but took them a step further. The 2008 team had hacked Boston’s Charle Ticket magstripe paper cards to copy them, change their value, and get free rides—but those cards went out of commission in 2021. So the four teens extended other research done by the 2008 hacker team to fully reverse engineer the CharlieCard, the RFID touchless smart cards the MBTA uses today. The hackers can now add any amount of money to one of these cards or invisibly designate it a discounted student card, a senior card, or even an MBTA employee card that gives unlimited free rides. “You name it, we can make it,” says Campbell.

To demonstrate their work, the teens have gone so far as create their own portable “vending machine”—a small desktop device with a touchscreen and an RFID card sensor—that can add any value they choose to a CharlieCard or change its settings, and they’ve built the same functionality into an Android app that can add credit with a tap. They demonstrate both tricks in the video below:

In contrast to the Defcon subway-hacking blowup of 2008—and in a sign of how far companies and government agencies have come in their relationship with the cybersecurity community—the four hackers say the MBTA didn’t threaten to sue them or try to block their Defcon talk. Instead, it invited them to the transit authority headquarters earlier this year to deliver a presentation on the vulnerabilities they’d found. Then the MBTA politely asked that they obscure part of their technique to make it harder for other hackers to replicate.

The hackers say the MBTA hasn’t actually fixed the vulnerabilities they discovered and instead appears to be waiting for an entirely new subway card system that it plans to roll out in 2025. When WIRED reached out to the MBTA, its director of communications, Joe Pesaturo, responded in a statement that “the MBTA was pleased that the students reached out and worked collaboratively with the fare collection team.”

“It should be noted that the vulnerability identified by the students does NOT pose an imminent risk affecting safety, system disruption, or a data breach,” Pesaturo added. “The MBTA's fraud detection team has increased monitoring to account for this vulnerability [and] does not anticipate any significant financial impact to the MBTA. This vulnerability will not exist once the new fare collection system goes live, due to the fact that it will be an account-based system versus today’s card-based system.”

The high schoolers say that when they started their research in 2021, they were merely trying to replicate the 2008 team’s CharlieTicket hacking research. But when the MBTA phased out those magstripe cards just months later, they wanted to understand the inner workings of the CharlieCards. After months of trial and error with different RFID readers, they were eventually able to dump the contents of data on the cards and begin deciphering them.

Unlike credit or debit cards, whose balances are tracked in external databases rather than on the cards themselves, CharlieCards actually store about a kilobyte of data in their own memory, including their monetary value. To prevent that value from being changed, each line of data in the cards’ memory includes a “checksum,” a string of characters computed from the value using the MBTA’s undisclosed algorithm.

The hackers figured out how to reproduce a “checksum” calculation intended to prevent the value stored on CharlieCards from being changed, circumventing that anti-hacking protection.Photograph: Roger Kisby

By comparing identical lines of memory on different cards and looking at their checksum values, the hackers began to figure out how the checksum function worked. They were eventually able to compute checksums that allowed them to change the monetary value on a card, along with the checksum that would cause a CharlieCard reader to accept it as valid. They computed a long list of checksums for every value so that they could arbitrarily change the balance of the card to whatever amount they chose. At the MBTA’s request, they’re not releasing that table, nor the details of their checksum reverse engineering work.

Not long after they made this breakthrough, in December of last year, the teens read in the Boston Globe about another hacker, an MIT grad and penetration tester named Bobby Rauch, who had figured out how to clone CharlieCards using an Android Phone or a Flipper Zero handheld radio-hacking device. With that technique, Rauch said he could simply copy a CharlieCard before spending its value, effectively obtaining unlimited free rides. When he demonstrated the technique to the MBTA, however, it claimed it could spot the cloned cards when they were used and deactivate them.

Early this year, the four teenagers showed Rauch their techniques, which went beyond cloning to include more granular changes to a card’s data. The older hacker was impressed and offered to help them report their findings to the MBTA—without getting sued.

In working with Rauch, the MBTA had created a vulnerability disclosure program to cooperate with friendly hackers who agreed to share cybersecurity vulnerabilities they found. The teens say they were invited to a meeting at the MBTA that included no fewer than 12 of the agency’s executives, all of whom seemed grateful for their willingness to share their findings. The MBTA officials asked the high schoolers to not reveal their findings for 90 days and to hold details of their checksum hacking techniques in confidence, but otherwise agreed that they wouldn’t interfere with any presentation of their results. The four teens say they found the MBTA’s chief information security officer, Scott Margolis, especially easy to work with. “Fantastic guy,” say Bertocchi.

The teens say that as with Rauch’s cloning technique, the transit authority appears to be trying to counter their technique by detecting altered cards and blocking them. But they say that only a small fraction of the cards they’ve added money to have been caught. “The mitigations they have aren’t really a patch that seals the vulnerability. Instead, they play whack-a-mole with the cards as they come up,” says Campbell.

“We’ve had some of our cards get disabled, but most get through,” adds Harris.

So are all four of them using their CharlieCard-hacking technique to roam the Boston subway system for free? “No comment.”

For now, the hacker team is just happy to be able to give their talk without the heavy-handed censorship that the MBTA attempted with its lawsuit 15 years ago. Harris argues that the MBTA likely learned its lesson from that approach, which only drew attention to the hackers’ findings. “It’s great that they’re not doing that now—that they’re not shooting themselves in the foot. And it’s a lot less stressful for everyone,” Harris says.

He’s also glad, on the other hand, that the MBTA took such a hardline approach to the 2008 talk that it got his attention and kickstarted the group’s research almost a decade and a half later. “If they hadn’t done that,” Harris says, “we wouldn’t be here.”

Update 5 pm ET, August 10, 2023: Added a statement form an MBTA spokesperson. Update 11:25 am, August 11, 2023: Clarified when the teens' meeting with the MBTA took place.

[-] [email protected] 17 points 11 months ago* (last edited 11 months ago)

This is a common design for merch bots to hawk, but I believe the original is from lookhuman, at least every other site that has it is one of those "anyone can register and print on demand any stolen design a la redbubble". I got a mug of this from lookhuman.

(Pasting here too so you both get a notification)

[-] [email protected] 20 points 11 months ago

If I understand correctly, every sync feature that requires the subscription (and cannot be purchased by a one time fee) requires the sync dev to run a constantly online server. Translation makes calls to translation services that cost money, push notifications require a push server since Lemmy servers don't include support for it, etc. Removing ads doesn't cost sync ongoing cash which is why you can get it for a one time fee.

Seems reasonable to me.

1
submitted 2 years ago* (last edited 2 years ago) by [email protected] to c/[email protected]

I just noticed that my instance lemmy.mesh.party is on the block list for lemmy.ml, which explains why I haven't been seeing any updated posts for about a month. As far as I know I haven't noticed any bad behavior in the couple default communities I created there, but there doesn't seem to be a way to check up on local user's activity elsewhere - I assume the block has to do with someone signing up and trolling, but I'm not sure how to stay in the loop so I can take action before getting blocked by other instances.

Is there any way to get better visibility into this or get alerted when local users are creating reports / bans / problems for other instances?

view more: next ›

Stephen304

joined 2 years ago