• 0 Posts
  • 10 Comments
Joined 1 year ago
cake
Cake day: June 15th, 2023




  • You’re aware that by law most cars after like 2015 2018 have to have a backup camera in the US right?

    If it is broken they are literally breaking the law by not fixing it.

    Yes, you can have your mirrors and rearview but the camera removes your blindspots that those miss (you know things like a small child that is behind your vehicle). It’s a critical safety feature that is broken and needs to be fixed.

    edit: NHTSA required it in 2018 not 2015, Canada probably has similar laws on the books too


  • It is arbitrary. While what classification a substance is may have some grounding in research, it’s mostly up to what interest group has either lobbied to get something under or whatever group law enforcement wants to be able to get easy charges for. Cannabis was Sched I because it made it easy for law enforcement to get big sentences for minorities and the counter culture participants of the day. Same thing with LSD and psilocybin.

    All the DEA scheduling is just pick and choose your charge for whatever ideological ax they want to grind. Hence why things don’t line up with reality




  • jeansburgertoPrivacy@lemmy.mlAh yes, smart lights need Tor.
    arrow-up
    1
    arrow-down
    2
    ·
    9 months ago
    link
    fedilink

    You’re aware that you can send whatever traffic you want over any port right? Using 123/udp for NTP is just convention. A light bulb that is updating its time over Tor is suspect. TP-Link would have their own infrastructure or use public pools to update the device’s time.


  • jeansburgertoPrivacy@lemmy.mlAh yes, smart lights need Tor.
    arrow-up
    2
    arrow-down
    7
    ·
    9 months ago
    link
    fedilink

    It’s been hacked, the light bulb is likely part of some botnet or under an attacker’s control directly. Which is why it’s sending that much data continuously. IoT/smart devices don’t send a lot of data in this sort of volume as most of the time they’re idle and maybe send a heartbeat or status update every once in a while to prove they’re alive.

    This is what is called an indicator of compromise or IoC, it’s some behavior or pattern that can be used to determine what is happening or who is the one doing the attacking.

    Likely OP would need to do some analysis to be able to get attribution unless it’s a very well known botnet actor in which case attribution is fairly straightforward.