Skip Navigation

InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)GO
Posts
0
Comments
653
Joined
2 yr. ago

  • Assuming the software isn't lost, then yeah, typically it can be emulated or reverse engineered to work.

    The bigger hurdle is the hardware, especially if the encoding of the data was proprietary, meaning that even if you could get a reading without it, you'd still need to figure out how to decode it into useful data

  • It depends. Electrolytic caps can leak and cause further damage to the boards, so it would be better to remove those outright, regardless of the plans.

    Personally though, there is way greater value in something like this if you can show people how it worked, rather than just how it looked.

  • Stop using email as a trusted authentication source.

    This is a case where using it was super convenient because you could have a personal identifier, an easy way to contact the user, and be reasonably sure that password resets would only reach the intended user all in one convenient plaintext string.

    However it's also a single point of failure and if a malicious actor can get access to your email account, they can get access to most of your other accounts that use that same address

    Edit: MFA being available in more places has reduced the risk of this happening, assuming that you use it and it's also deployed correctly. ie: it can't be reset from the same email address that your password resets go to.

  • It looks fine if you use the digital output rather than analog.

    If the purity of the analog signal is important, you can run it through a retrotink or OSSC. Although that's another expensive addition to the setup.

  • I agree that for this size of network AD is definitely not something you want to deal with unless you want to learn how it works.

    However, I'm not sure it really increases attack vectors to have it running, outside of the fact that it's a new network service on the LAN. The out of the box default configuration is not bad these days, security-wise

  • It should be noted that this attack was demonstrated on a nearly 10 year old laptop that has the TPM traces exposed on the motherboard.

    Most TPMs nowadays are built into the CPU which does not leave them vulnerable to this type of attack.