this post was submitted on 12 Oct 2024
363 points (98.1% liked)
Technology
59429 readers
2632 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
There's different types of hacking. Finding and coding up an exploit? That takes skill
Then, they post it in a corner of the Internet somewhere to get appreciation for their achievement, or maybe even sell it on the dark web (or someone else sees it and packages it up in a state to sell/share)
Now, using the exploit? That's pretty easy. It requires some technical ability, but not much. It's just installing and configuring stuff, then using an app
So here's what I think happened. Someone found the exploit, and posted about it in a hacker community off the beaten path. One thing led to another, and somehow a group of edgelords get a hold of it. As a group, they manage to get it working, and act like edgelords
The original hacker might have been related, but real hackers are cautious or quickly caught - they probably solved the puzzle, maybe played with it a bit, then posted their findings and moved on to the next puzzle