• saltnotsugar@lemmy.world
    link
    fedilink
    arrow-up
    45
    ·
    12 days ago

    Cybersecurity experts can block malware, what you need is a picture of a goat’s butthole or something technical like that.

      • I remember when aimbots in Counter-Strike worked by searching for a specific color pattern that it would lock onto, so it became somewhat common to put those colors at the center of an image to use as a spray and force any cheaters to stare at a wall. Goatse was a common image used for this.

        Glad to see old tricks get new purpose.

    • prettybunnys@piefed.social
      link
      fedilink
      English
      arrow-up
      22
      ·
      12 days ago

      That’s just a test file tho. Its whole purpose is to prove heuristic based scans work.

      It’s not actually a virus.

      • Bloefz@lemmy.world
        link
        fedilink
        arrow-up
        22
        ·
        12 days ago

        No it’s not but the whole point of it is that antivirus packages detect it, and they will kill and quarantine the process handling the data. Its purpose is to trigger an antivirus response for testing purposes.

        So it can indeed be used as a DoS kinda thing in many cases.

        • MalReynolds@slrpnk.net
          link
          fedilink
          English
          arrow-up
          12
          ·
          edit-2
          12 days ago

          Nice, if android even cares though. Dunno, what’s the state of android AV these days?

          And iOS I suppose, the glasses aren’t attached to a laptop most likely. And does the app auto-open QR codes? Enquiring minds want to know, because this is a solid idea if it can be made to work.

          • Bloefz@lemmy.world
            link
            fedilink
            arrow-up
            2
            ·
            12 days ago

            There’s some AV packages like Lookout that are pretty common in corporate environments.

            And really any big data collection through apps will make itself to servers eventually if course. You don’t need to open a URL for this to trigger, the eicar code being in memory of a process is enough.

            Of course you do need to decode the QR. But I’m sure many environments focused on video data collection would device QR codes.

  • cravl@slrpnk.net
    link
    fedilink
    arrow-up
    26
    ·
    12 days ago

    Alternatively, send them straight to a site that absolutely gets them put on some watchlist. Not as much instant karma as malware, but situationally more useful in the grand scheme of things. (Some kind of government honeypot perhaps, or just phish n’ dox them.)

  • Zephorah@discuss.online
    link
    fedilink
    arrow-up
    22
    ·
    12 days ago

    I was shopping for glasses late last year and these were frame options on every site I browsed. They’re out there. Whether or not people are buying is another thing.

    • moonshadow@slrpnk.net
      link
      fedilink
      arrow-up
      12
      ·
      12 days ago

      I’ve seen these in the wild exactly once so far, a tour group was shaming one of its members into taking them off. Warmed my heart

        • moonshadow@slrpnk.net
          link
          fedilink
          arrow-up
          4
          ·
          12 days ago

          But it is meta, and the tech requires a corruptible centralization of power like that, so they’re great for ICE watching in the exact opposite of the way you’re hoping for

  • BenjiRenji@feddit.org
    link
    fedilink
    arrow-up
    14
    ·
    12 days ago

    So as someone who works exactly on this, the best way is still exploiting the user. The “QR code scanned” notification needs to look like something useful or enticing so the download or link is opened. The glasses would never automatically download and even execute a binary without the user.

    Easiest is probably some PDF reader exploit. There I can see a path of auto download and auto execute with only minimal user intervention. If the PDF has a good title you’ll take the user approval hurdle easy.

    Or payment apps. Some users have payments almost automated. Accidentally confirming a payment popup in the wrong moment seems like a viable exploit.

    • harmbugler@piefed.social
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      2
      ·
      12 days ago

      I wore a mask to the hardware store today. My kid wore a mask too and I pointed out the sign on the door that notified us that the store uses cameras and facial recognition. We were the only ones and we felt a bit self conscious, but if that’s what we have to do to retain anonymity/privacy then that’s sadly the world we live in now.

      • titanicx@lemmy.zip
        link
        fedilink
        arrow-up
        4
        ·
        11 days ago

        It’ll never work. There are more cameras then you realize and more then you can hide from. Even driving down the freeway you can be photographed and identified from your car.

  • ulterno@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    12 days ago

    It is very possible that all store camera apps get an update from Google/Apple etc that bricks the phone or temporarily suspends functionality (also preventing phone locking) on glancing a specific QR code that will be given to all ICE operatives to wear somewhere on their uniform.

  • Fart Armpit@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    12 days ago

    Hidden? Oh really? The circles where the temples are attached to the frame of the glasses don’t look like ordinary metal fittings… i see this shit pointed at me – i carefully remove them off owner’s face and… politely explain why i did it? Nevermind

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      arrow-up
      1
      ·
      11 days ago

      I get the sentiment, but please don’t. You’re just going to get yourself an assault charge, and the wearer will only be more emboldened.