this post was submitted on 23 Jun 2025
1010 points (98.6% liked)

Technology

71800 readers
4219 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
you are viewing a single comment's thread
view the rest of the comments
[–] uninvitedguest@lemmy.ca 119 points 23 hours ago* (last edited 23 hours ago) (2 children)

In an age where "willfully giving out your account password" is called hacking, here I'd call it tomato or tomato.

[–] JasonDJ@lemmy.zip 76 points 23 hours ago (5 children)

Social Engineering is hacking cmv.

[–] OldManBOMBIN@lemmy.world 20 points 23 hours ago

No, because I agree.

[–] nickwitha_k@lemmy.sdf.org 1 points 14 hours ago

It was hacking according to Kevin Mitnick (RIP) so, it's probably safe to say that your view doesn't need to be changed.

[–] Venus_Ziegenfalle@feddit.org 4 points 22 hours ago* (last edited 22 hours ago)

There's usually an element of that with cracking passwords. Even if you just try and pick a good wordlist for a target you're already engaging in a way. The more you know about them the shorter the wordlist. And if you spend enough time getting to know shit about them you can reduce the wordlist to one entry because they told you the password. In a way. It's not necessarily a completely different process is my point.

[–] UnderpantsWeevil@lemmy.world 1 points 21 hours ago (2 children)

You can argue it's a classic ID-10T error in your workflow.

But nobody has discovered a security vulnerability within the system architecture. This is the system operating as designed, abet with the wrong person standing in front of the terminal.

[–] em2@lemmy.ml 10 points 21 hours ago (1 children)

That's called a PICNIC - Problem In Chair Not In Computer.

[–] Krudler@lemmy.world 10 points 20 hours ago
[–] catloaf@lemm.ee 3 points 20 hours ago (1 children)

That's cracking, not hacking. If you're going to be pedantic, be correct.

[–] UnderpantsWeevil@lemmy.world 1 points 19 hours ago

However you want to phrase it, they're very different problems with different solutions.

"Someone picked the lock on my door and got into my house" is meaningfully distinct from "Someone stole my keys".

[–] prettybunnys@sh.itjust.works 20 points 23 hours ago (1 children)

here I'd call it tomato or tomato.

It’s pronounced tomato

[–] KingJalopy@lemm.ee 5 points 23 hours ago (1 children)
[–] UnderpantsWeevil@lemmy.world -1 points 21 hours ago

You can keep your nasty chips