lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 4 Aug 2013 16:04:18 +0300 From: Georgi Guninski <guninski@...inski.com> To: Valdis Kletnieks <Valdis.Kletnieks@...edu> Cc: full-disclosure@...ts.grok.org.uk Subject: Re: Software that you *really* wish had been more secure... lol :) Since the attack is from a device, a PIN of four decimal digits doesn't appear hard to bruteforce. On Sat, Aug 03, 2013 at 11:20:01PM -0400, Valdis Kletnieks wrote: > tl;dr: Everything shipped with the same PIN of '0000'. Hilarity and lulz ensue. > > http://www.androidpolice.com/2013/08/03/android-bluetooth-exploit-for-japanese-toilet-brings-new-meaning-to-the-word-vulnerability/ > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists