this post was submitted on 27 Oct 2023
85 points (86.3% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

53792 readers
81 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder


💰 Please help cover server costs.

Ko-FiLiberapay


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 8 points 10 months ago (1 children)

Ehhhh it’s flexible enough that I’d bet it can change its “identity” and make it seem like 1000 different devices

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (1 children)

There seems to (at least theoretically) whitelist pairing-requests by mac-adress. Randomly hitting those few approved adresses consistently seems fairly unlikely: https://kb.vmware.com/s/article/50121103 (how to do it on Samsung, wish I had this option as well)

[–] [email protected] 1 points 10 months ago

Yes, but these are requests for new devices to pair

And most people aren’t going to bother with that white list

And even if they did, the attack can be tailored to the white list, because you don’t need to have a real Mac address, it can be spoofed