this post was submitted on 23 Jun 2025
1114 points (98.5% liked)

Technology

71843 readers
4277 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
you are viewing a single comment's thread
view the rest of the comments
[–] null_dot@lemmy.dbzer0.com 1 points 11 hours ago (1 children)
[–] Kazumara@discuss.tchncs.de 8 points 10 hours ago (2 children)

I'd start with the following, and refine if necessary:

"Gaining unauthorized access to a protected computer resource by technical means."

  • Port scanning --> Not hacking because there isn't any access to resources gained*
  • Using default passwords that weren't changed --> Not hacking because the resource wasn't protected*
  • Sending spam --> Not hacking because there isn't any access to resources gained
  • Beating the admin with a wrench until he tells you the key --> Not hacking because it's not by technical means.
  • Accessing teacher SSN's published on the state website in the HTML --> Not hacking because the resource wasn't protected, and on the contrary was actively published**
  • Distributed denial of service attack --> Not hacking because there isn't any access to resources gained

* Those first two actually happened in 2001 here in Switzerland when the WEF visitors list was on a database server with default password, they had to let a guy (David S.) go free
** The governor and his idiot troupe eventually stopped their grandstanding and didn't file charges against Josh Renaud of the St. Louis Post-Dispatch reporter, luckily

When my parents kicked me out, the number of times o got to sleep inside because i could convince people i was the county password inspector was more than zero. It's hacking.

Wrench? No. But an old colleague informs me that the version done with a machete does count as hacking. I concur.

Those are both way more useful than exploiting a lazy coder's fuckup, renaming 'house of many backdoors' to 'that package everyone uses in everything' on github, or some fancy math shit.

Your laws are nonsense bullshit, they're just excuses for power and I'd appreciate you not defiling language fof the rest of us to justify them.

[–] null_dot@lemmy.dbzer0.com 0 points 4 hours ago

Oh man.

My comment was intended to imply that the term "hacking" defies definition because it has been grossly overused and misconstrued over many decades.

Sure you might be able to convey what it means to you but of course it means different things to everyone else, with each definition being equally appropriate.

Er go, any discussion is one of semantics.