• 1 Post
  • 81 Comments
Joined 1 year ago
cake
Cake day: June 22nd, 2023

help-circle


  • If they control the domain, they can see all incoming mail delivery attempts to sniff for addresses that were used. They’d still have to know the domain of the email address for the login they were attacking, which might not be super useful if they’re going after a certain login. But, going the other direction would be more fruitful: buy a domain, dump all incoming mail into a catch-all box, and start looking for bank alert emails or other periodic/promo emails. You might find services that just use email addresses for a login name, or ones that have a “forgot username” feature that only uses email for recovery. Multi-factor auth spread across multiple services (email, SMS, authenticator codes…) would help mitigate significantly by making them also have to take over a phone number or get an old device. Not impossible, but then you’re making them work harder for it, and when good account recovery services heavily mask the available targets, it makes it harder to know what else to acquire (e.g., a specific phone number) even if they get as far as full email domain control.



  • atx_aquarian@lemmy.worldtoTechnology@lemmy.worldTikTok sues the US government over ban
    link
    fedilink
    English
    arrow-up
    37
    arrow-down
    6
    ·
    edit-2
    2 months ago

    What would give them standing? They’d have to be an entity protected by the constitution to claim that protection was harmed. Is it this (Wikipedia)?

    TikTok Ltd was incorporated in the Cayman Islands and is based in both Singapore and Los Angeles. source

    I guess I’ve never thought about what makes an entity have rights here. Buckingham Palace couldn’t just open shop here and start suing our government, right?

















  • Good point in general, but, what they’re specifically talking about here (rolling codes), perhaps what they should have said is that no one can (feasibly) do it, not just that their hardware isn’t capable.

    Edit: Oh, for the blocking signal, that part might be functionality that could be added, I see what I think you’re saying there. Still, that would be a step towards it, but it would still require serious hardware to crack a private key, as I understand.