• bleistift2@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    45
    ·
    1 year ago

    I believe this should work. At least some German emergency vehicles now come with filming protection.

    The linked web page reads, “Attention! Rubbernecking kills!”

    • naeap@sopuli.xyz
      link
      fedilink
      arrow-up
      12
      arrow-down
      1
      ·
      1 year ago

      I’m not sure a pseudo QR code on the truck gives off the right message

      I actually would really like to know, what it says and would make myself punishable by that
      But I think, it looks so inviting to scan it…

      • bleistift2@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        The way I see it there are two options:

        1. You’re in a car and driving past that vehicle. If you don’t have your phone ready already, you won’t get it out in time and won’t be able to scan the code. You didn’t read the code and didn’t need to (because you weren’t rubbernecking).

        2. You’re in a car with your phone already out (because you’re expecting a crash) or you’re a pedestrian who takes out their phone to film the crash site. You do read the code and you should see it, because you’re rubbernecking.

        • naeap@sopuli.xyz
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          1 year ago

          I was more thinking about not driving the car myself, but being driven as a passenger

          Although it’s obviously a safety issue, when people turn away their focus to checkout a crash - no discussion about that - I was more thinking about the ethical issue of gaffing at injured people

  • blackn1ght@feddit.uk
    link
    fedilink
    arrow-up
    30
    arrow-down
    1
    ·
    1 year ago

    All fun and games until you open your camera app and it’s in selfie mode, instantly catching the QR code and bricks your own phone.

    • Psythik@lemmy.world
      link
      fedilink
      arrow-up
      17
      ·
      1 year ago

      That makes no sense, cause why would you intentionally click on the link you inadvertently scanned to brick your own phone?

  • Jolteon@lemmy.zip
    link
    fedilink
    arrow-up
    25
    ·
    1 year ago

    I can’t think of a single phone that automatically opens links that are in QR codes. The worst it would do is just show a link to malware, wish you would have to manually click in order to download the malware.

      • themoonisacheese@sh.itjust.works
        link
        fedilink
        arrow-up
        5
        ·
        1 year ago

        Quite the opposite. That video by mattkc (iirc) repeatedly and unequivocally says that to make this work, he made his pc save the binary and explicitly run it using a python script, because doing it natively would be fucking insane

          • themoonisacheese@sh.itjust.works
            link
            fedilink
            arrow-up
            0
            ·
            1 year ago

            The 3DS used to be hacked using a QR code that was scanned using the game cubic ninja (it used QR codes as a medium for sharing levels). The interpreter had a basic memory safety bug, so you could trigger a ROP chain using a malformed QR code to get ACE. This was of course voluntary by the user (and cubic ninja was hard to get because it was not a commercial success) but that qualifies, I guess.

            Then they found out the 3ds browser uses a WebKit version from 2003 and nowadays you just go to a website lol

    • BugKilla@lemmy.world
      link
      fedilink
      arrow-up
      7
      arrow-down
      1
      ·
      1 year ago

      Well, yes. You could bury code or malicious data in an image, QR or otherwise, and leverage an exploit that during processing of the visual data within the camera subsystem or inter subsystem calls could hypothetically trigger an execution path that results in a different outcome than expected, all without user permission. There is a lot of sw and hw sec controls in play at internal system boundaries and it would be very very difficult to gain privilege enough to fist fuck a phone but not impossible.

      With the outstanding level of FR, NFR and Sec testing that companies perform these days it is not likely to happen. It’s not like they push out minimal viable products or something, right? /S

    • littlewonder@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      Most do. It’s the only reason they finally somewhat caught on after a rough start when users had to download an app in order to read the code.

    • tacosanonymous@lemm.ee
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      Every smartphone I’ve had does but every one of them has also asked if I want to follow the link rather than just doing it.

        • TheOakTree@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          1 year ago

          That’s custom software on custom firmware, which is very extraneous to the average consumer…

          It’s also not a “released” phone in the sense that Google isn’t selling it in that state.