>save .mp4>see this in 5 minutes
>>103255822HIROSHIMOOOOOOOOOOOOOT
>what are backups
>pay me $97,000 to get your anime jpegs back
>>103255940he might have some very rare pepes
>>103255822lol, lmao even.
>>103256061where's the funny
>>103255822>AES-256>RSA-2048nothingburger, can be decrypted without even trying lmao
>>103255822Genuine question, can this actually happen? Can fucking mp4 be the gateway to arbitrary code execution?
>>103256088can you crack my dads bitcoin private key
>>103255822>2016
>>103255822Ransom increase time: 2016...
>>103256088>nothingburger, can be decrypted without even trying lmaoSource? I have masturbation videos of myself encrytpted with AES-256
>>103256101Yes, via exploiting vulnerabilities in media players, same with image viewers. It's rarer today for these kinda of vulns to exist, especially in wells established software, but it can happen.
>>103256101Any media player can be exploited. That's why we wrap that rascal with Firejail or Bubblewrap that is using Mandatory Access Controls.
>>103256101windows explorer has displaying extensions off by defaultiirc they would name the file s01e01.mp4.exe and in windows you wouldn't see the .exe part if you never changed that setting
>>103256075babyduck syndrome
>>103256300>windows explorer has displaying extensions off by defaultI'm fairly certain it's not...
>>103255822>windowslel
>>103255822VLC'd
>>103256101>>103256233some pedo using tails os got caught years ago thanks to a vulnerability in the media player that was included. feds sent him a video, he tried to play it and it leaked his real ip iirc kek
>>103256101>>103256541They also spent an obscene amount of money to discover and execute that vulnerability.Just to put it into perspective, it's possible but not easy. It's not basic script kiddie stuff.
>>103256601indeed. lots of time, money and manpower just for one pedo
>>103255822picrel is one of my greatest fears. I have some backups, but they are old, and not even air-gapped.
>>103256541tails was coerced long ago by both French police and interpol to weaken the settings of the browsers and players it comes with.>>103256601That was a show so that people would keep using tails. Same as the show that apple put on to make it look like its hard to access a locked or powered off iPhone when in fact all one needs is a JTAG dongle. There are now decent sized communities of hackers making these dongles and a couple companies that sell them to cops.
>>103257030>powered off iPhone when in fact all one needs is a JTAG dongle. There are now decent sized communities of hackers making these dongles and a couple companies that sell them to cops.Is there more info about it? How are they exactly opening the device?
>>103255916>waits for you to backup>lock your backups too>>103256101WebP was recently but it got patched before a disaster.>>103256461Yes it is(was). I had to turn them on every time. A usual example of making things supposedly retard friendly actually making things more complicated.>>103256541That's why Whonix > Tails. Reasonably assuming a VM vuln is way less likely than a random gstreamer gnome video player app having one.
Does that mean we have metadata now?
>>103256461Fuck off you imbecile moron.
>>103257237where's all teh data
>>103257165would they get spawncamped like they do in prison?>>103257046>>103257030probably just his schizo theory, jtag devices aren't a secret in reverse engineering and modern smartphones have fucktarded security chips that the feds definitely don't have a backdoor into that have mitigations against being shot with laser beams, unless he knows something and can leak it to us pls
>>103257868>probably just his wapadoodle theoryNo all phones leave JTAG debugging enabled. There are communities of nerds building these and seeing what debug functions they can access. They are long past unlocking phones.
>>103255822when this happens I put in a new hard drive what's the problem
>>103256541>glowie try not to upload 'p challenge (impossible)
>>103257237nopeyou will never have metatatatatadayou will never have EXIF dataatatatatoo many selfdoxxing morans
>>103257900>you will never be a metadata
>>103257888he might be on to something.........
>>103257134WebP RCE exploit was used by certain government intelligence agencies to target political adversaries, I am convinced still to this day no one else knows how to reproduce it.
>>103256541iirc they planted a specially prepared cp file, with video container able to have hyperlink sections for some metadata like posters or subtitles. the link pointed to their own server and they just assumed the pedo had video player set to download such content automatically and would play it on a pc not routing all network traffic via tor. their assumption was correct. it wasn't vuln leading to rce, just a proper support of file format and unsafe defaults.
>>103257920You can find videos of the nerds unlocking phones, pulling debug info, accessing all the files, etc... Cellebrite just makes it easy for non technical people (patrol cops) to grab everything (for money of course).
>>103258018https://www.theregister.com/2017/02/06/microsoft_drm_and_tor/it was a wmv signed with special cert, which the moron opened with windows media player.
>>103255822How does this shit even get through browsers and antiviruses these days?
>>103256300okay so that's an .exe., not an .mp4, so not germane to the question
>>103255822
>>103258059only see them doing it on the centennial era iPhones, apple said wontfix to one of the vulnerabilties the guy in the video below just found (government has a vulnerability using that or sum shit). but it looks like the nerds might be getting close, but I still don't see any BFU unlockshttps://www.youtube.com/watch?v=cFW0sYSo7ZM
>>103258292works on all phones, well all Droid/iPhone that is. Also using JTAG one can tell the phone that the correct PIN has been entered. The enclave is unlocked and encryption is decrypted.
>>103255822How did these things ever work? There really wasn't a way around them? Just take out the hard drive and grab the files via another computer.
>>103258689The files are actually encrypted, anon. If they wanted to do it very quickly they could have it encrypt every tenth of a file and scramble it that way.
>>103258396seems it was possible on old Google Pixel phones (Titan M1) in 2022, but not past pixel 6 with the Titan M2 which seems to be independent from the rest of the system almost entirely.https://blog.quarkslab.com/attacking-titan-m-with-only-one-byte.htmli don't know shit about iPhones because they didn't try to make news out of their security chip upgrades but I'm pretty sure they do the same thingsend if you have a video on the newer ones THOUGH i love watching thosehttps://youtu.be/dSgSnYPgzT0
>>103258707They decrypt first. It takes all of 10 milliseconds with a JTAG command to say that the PIN was correctly entered. Decrypted. Simple as.
>>103258728So they don't randomize the encryption key?
>>103258707So if you clicked something and this ransomwear happened, how long would it take ti fuck everything up?
>>103258762Key material doesn't matter. Its in an enclave protected by your PIN. The phone just has to be told the PIN was entered correctly.
>>103258764If they knew what they were doing, it would pop up after it was done.
>>103258772I'm not familiar with phone malware. I was referring to PCs.
>>103258817he got confused while talking to me about phone vulnerabilities or something>>103258724
>>103256625The idea is to catch one dead to rights and then flip them to catch more
>>103258764Depends, it won't actually display anything to the user until it has finished its routine. The speed which it happens depends on number of files, file size, your hardware, etc. Ransomware will target specific directories and file types (docs, databases, spreadsheets, pictures, etc) to minimise the amount of work it has to do whilst still causing the most functional loss for the victim. The longer it has to run, the more time you have to notice something is awry before it finishes its routine
Can this happen if I download the .mp4 from here now that 4chan accepts .mp4?
>>103258133Schizos BTFO.
>>103256088you have no idea what youre talking about
>>103256541this was patched btw
>>103257900That's not why metadata is gone. It's gone because of the extension people were using to add links and secondary images inside the metadata.
>>103257237>>103257900exif was removed because stupid niggers took photos from their dads camera saying they'll shoot up their school tomorrow, the exif data had the gps location and the dads name, and the people on /b/ noticed it and called the cops on him.not kidding, but this was back in like 2006.
what's a tool to remove all metadata from my archives
>>103261071Use mediainfo and exiv2 to find out what's there to begin with
>>103261017and metadata didn't start getting scrubbed until 2020 when the third-eye extension got popular and let people post images with entire other images embedded inside the metadata and links to things from other sites.
>>103257237>>103257900>>103257907>>103260922>>103261017read byte 0x69 to 0xb3 of this video
>>103263096
>>103263096Don't do it guys it creates nerve gas
your computer sucks if its vulnerable to ransomware
>>103263096What?How?
>>103263167because modern phones are bloated and useless and worse and just plain bad and useless
>>103263096Cool magic trick. Now do it with a video that actually looks like a normal mp4 or else it doesn't count.
>>103255916Backup me arse. Start fresh.