• Jolteon@lemmy.zip
    link
    fedilink
    arrow-up
    36
    ·
    3 days ago

    I can’t think of a single phone that automatically opens links that are in QR codes. The worst it would do is just show a link to malware, wish you would have to manually click in order to download the malware.

    • smeg@feddit.uk
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      2
      ·
      2 days ago

      This was a few years ago (so I hope there have been patches since then) but I watched a video which was trying to make an entire game within a QR code: they don’t have to just be links, they can be binaries that some devices will immediately run without question!

      • themoonisacheese@sh.itjust.works
        link
        fedilink
        arrow-up
        11
        ·
        2 days ago

        Quite the opposite. That video by mattkc (iirc) repeatedly and unequivocally says that to make this work, he made his pc save the binary and explicitly run it using a python script, because doing it natively would be fucking insane

        • smeg@feddit.uk
          link
          fedilink
          English
          arrow-up
          2
          ·
          1 day ago

          You’re right, I must have been thinking of something else. Happily I can’t find any chatter about actual malware in QR codes (it’s all redirecting to malicious websites), though obviously there’s always the possibility of a new exploit being discovered.

          • themoonisacheese@sh.itjust.works
            link
            fedilink
            arrow-up
            4
            ·
            1 day ago

            The 3DS used to be hacked using a QR code that was scanned using the game cubic ninja (it used QR codes as a medium for sharing levels). The interpreter had a basic memory safety bug, so you could trigger a ROP chain using a malformed QR code to get ACE. This was of course voluntary by the user (and cubic ninja was hard to get because it was not a commercial success) but that qualifies, I guess.

            Then they found out the 3ds browser uses a WebKit version from 2003 and nowadays you just go to a website lol

            • smeg@feddit.uk
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 day ago

              ACE on a WiiU is just as easy, at least with the Wii you had to use a game!

  • bleistift2@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    52
    ·
    3 days ago

    I believe this should work. At least some German emergency vehicles now come with filming protection.

    The linked web page reads, “Attention! Rubbernecking kills!”

    • naeap@sopuli.xyz
      link
      fedilink
      arrow-up
      16
      arrow-down
      1
      ·
      3 days ago

      I’m not sure a pseudo QR code on the truck gives off the right message

      I actually would really like to know, what it says and would make myself punishable by that
      But I think, it looks so inviting to scan it…

      • bleistift2@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        The way I see it there are two options:

        1. You’re in a car and driving past that vehicle. If you don’t have your phone ready already, you won’t get it out in time and won’t be able to scan the code. You didn’t read the code and didn’t need to (because you weren’t rubbernecking).

        2. You’re in a car with your phone already out (because you’re expecting a crash) or you’re a pedestrian who takes out their phone to film the crash site. You do read the code and you should see it, because you’re rubbernecking.

        • naeap@sopuli.xyz
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          2 days ago

          I was more thinking about not driving the car myself, but being driven as a passenger

          Although it’s obviously a safety issue, when people turn away their focus to checkout a crash - no discussion about that - I was more thinking about the ethical issue of gaffing at injured people

  • blackn1ght@feddit.uk
    link
    fedilink
    arrow-up
    37
    arrow-down
    2
    ·
    3 days ago

    All fun and games until you open your camera app and it’s in selfie mode, instantly catching the QR code and bricks your own phone.

    • Psythik@lemmy.world
      link
      fedilink
      arrow-up
      19
      ·
      3 days ago

      That makes no sense, cause why would you intentionally click on the link you inadvertently scanned to brick your own phone?

            • ChaoticNeutralCzech@feddit.org
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              19 hours ago

              Professional Mornington Crescent player

              Explanation for people not familiar with the Radio 4 game show:

              The game consists of each panellist in turn announcing a landmark or street, most often a London tube station. The ostensible aim is to be the first to announce “Mornington Crescent”. Interspersed with the turns is humorous discussion amongst the panellists and host regarding the rules and legality of each move, as well as the strategy the panellists are using. The actual aim of the game is to entertain the other participants and listeners with amusing discussion of the fictional rules and strategies.

              Yes, you can play the obvious trump card on turn 1 and win but where’s the fun in that?

    • BugKilla@lemmy.world
      link
      fedilink
      arrow-up
      8
      arrow-down
      1
      ·
      2 days ago

      Well, yes. You could bury code or malicious data in an image, QR or otherwise, and leverage an exploit that during processing of the visual data within the camera subsystem or inter subsystem calls could hypothetically trigger an execution path that results in a different outcome than expected, all without user permission. There is a lot of sw and hw sec controls in play at internal system boundaries and it would be very very difficult to gain privilege enough to fist fuck a phone but not impossible.

      With the outstanding level of FR, NFR and Sec testing that companies perform these days it is not likely to happen. It’s not like they push out minimal viable products or something, right? /S

      • theneverfox@pawb.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        17 hours ago

        Well that’s one layer, but when you decode a url, you’re probably going to get a url, and then it’s going to go to that url

        So now you just made them to to a website. What’s there? Whatever you want. Maybe you ask them for Facebook/Google/GitHub or whatever authorization to see their name and email, which a lot of people would do. Then redirect them to a page saying “now I know who you are, delete the photo, <user>”

        Or you could send them a payload based on fingerprinting their request, you could give them a fake page to steal their password, etc

    • littlewonder@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      3 days ago

      Most do. It’s the only reason they finally somewhat caught on after a rough start when users had to download an app in order to read the code.

    • tacosanonymous@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      3 days ago

      Every smartphone I’ve had does but every one of them has also asked if I want to follow the link rather than just doing it.

        • TheOakTree@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          2 days ago

          That’s custom software on custom firmware, which is very extraneous to the average consumer…

          It’s also not a “released” phone in the sense that Google isn’t selling it in that state.