this post was submitted on 23 Jun 2025
1008 points (98.7% liked)

Technology

71800 readers
5072 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 
  • Hours after the US airstrike on Iranian territory, Iranian-backed hackers took down US President Donald Trump’s social media platform.
  • Users were struggling to access Truth Social in the early morning following the alleged hack.
  • As the US continues to insert itself into the ongoing Iran-Israel conflict, the US government believes more cyberattacks could happen.
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 205 points 22 hours ago (21 children)

Unclear from the article but, while a bit pedantic, this sounds more like it was potentially a DDoS attack rather than a proper "hack".

[–] [email protected] 118 points 22 hours ago* (last edited 22 hours ago) (2 children)

In an age where "willfully giving out your account password" is called hacking, here I'd call it tomato or tomato.

[–] [email protected] 76 points 22 hours ago (5 children)

Social Engineering is hacking cmv.

[–] [email protected] 20 points 22 hours ago

No, because I agree.

[–] [email protected] 1 points 13 hours ago

It was hacking according to Kevin Mitnick (RIP) so, it's probably safe to say that your view doesn't need to be changed.

[–] [email protected] 4 points 20 hours ago* (last edited 20 hours ago)

There's usually an element of that with cracking passwords. Even if you just try and pick a good wordlist for a target you're already engaging in a way. The more you know about them the shorter the wordlist. And if you spend enough time getting to know shit about them you can reduce the wordlist to one entry because they told you the password. In a way. It's not necessarily a completely different process is my point.

[–] [email protected] 2 points 20 hours ago (1 children)

You can argue it's a classic ID-10T error in your workflow.

But nobody has discovered a security vulnerability within the system architecture. This is the system operating as designed, abet with the wrong person standing in front of the terminal.

[–] [email protected] 10 points 20 hours ago (1 children)

That's called a PICNIC - Problem In Chair Not In Computer.

[–] [email protected] 10 points 19 hours ago
[–] [email protected] 20 points 21 hours ago (1 children)

here I'd call it tomato or tomato.

It’s pronounced tomato

[–] [email protected] 5 points 21 hours ago (1 children)
[–] [email protected] 0 points 20 hours ago

You can keep your nasty chips

load more comments (18 replies)