• Jolteon
    link
    fedilink
    arrow-up
    36
    ·
    3 days ago

    I can’t think of a single phone that automatically opens links that are in QR codes. The worst it would do is just show a link to malware, wish you would have to manually click in order to download the malware.

  • bleistift2@sopuli.xyz
    link
    fedilink
    English
    arrow-up
    53
    ·
    3 days ago

    I believe this should work. At least some German emergency vehicles now come with filming protection.

    The linked web page reads, “Attention! Rubbernecking kills!”

    • naeap@sopuli.xyz
      link
      fedilink
      arrow-up
      16
      arrow-down
      1
      ·
      3 days ago

      I’m not sure a pseudo QR code on the truck gives off the right message

      I actually would really like to know, what it says and would make myself punishable by that
      But I think, it looks so inviting to scan it…

      • bleistift2@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        3
        ·
        2 days ago

        The way I see it there are two options:

        1. You’re in a car and driving past that vehicle. If you don’t have your phone ready already, you won’t get it out in time and won’t be able to scan the code. You didn’t read the code and didn’t need to (because you weren’t rubbernecking).

        2. You’re in a car with your phone already out (because you’re expecting a crash) or you’re a pedestrian who takes out their phone to film the crash site. You do read the code and you should see it, because you’re rubbernecking.

        • naeap@sopuli.xyz
          link
          fedilink
          arrow-up
          1
          ·
          edit-2
          2 days ago

          I was more thinking about not driving the car myself, but being driven as a passenger

          Although it’s obviously a safety issue, when people turn away their focus to checkout a crash - no discussion about that - I was more thinking about the ethical issue of gaffing at injured people

  • blackn1ght@feddit.uk
    link
    fedilink
    arrow-up
    37
    arrow-down
    2
    ·
    3 days ago

    All fun and games until you open your camera app and it’s in selfie mode, instantly catching the QR code and bricks your own phone.

    • Psythik@lemmy.world
      link
      fedilink
      arrow-up
      19
      ·
      3 days ago

      That makes no sense, cause why would you intentionally click on the link you inadvertently scanned to brick your own phone?

            • ChaoticNeutralCzech@feddit.org
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              23 hours ago

              Professional Mornington Crescent player

              Explanation for people not familiar with the Radio 4 game show:

              The game consists of each panellist in turn announcing a landmark or street, most often a London tube station. The ostensible aim is to be the first to announce “Mornington Crescent”. Interspersed with the turns is humorous discussion amongst the panellists and host regarding the rules and legality of each move, as well as the strategy the panellists are using. The actual aim of the game is to entertain the other participants and listeners with amusing discussion of the fictional rules and strategies.

              Yes, you can play the obvious trump card on turn 1 and win but where’s the fun in that?

    • BugKilla@lemmy.world
      link
      fedilink
      arrow-up
      7
      arrow-down
      1
      ·
      3 days ago

      Well, yes. You could bury code or malicious data in an image, QR or otherwise, and leverage an exploit that during processing of the visual data within the camera subsystem or inter subsystem calls could hypothetically trigger an execution path that results in a different outcome than expected, all without user permission. There is a lot of sw and hw sec controls in play at internal system boundaries and it would be very very difficult to gain privilege enough to fist fuck a phone but not impossible.

      With the outstanding level of FR, NFR and Sec testing that companies perform these days it is not likely to happen. It’s not like they push out minimal viable products or something, right? /S

      • theneverfox@pawb.social
        link
        fedilink
        English
        arrow-up
        1
        ·
        21 hours ago

        Well that’s one layer, but when you decode a url, you’re probably going to get a url, and then it’s going to go to that url

        So now you just made them to to a website. What’s there? Whatever you want. Maybe you ask them for Facebook/Google/GitHub or whatever authorization to see their name and email, which a lot of people would do. Then redirect them to a page saying “now I know who you are, delete the photo, <user>”

        Or you could send them a payload based on fingerprinting their request, you could give them a fake page to steal their password, etc

    • littlewonder@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      3 days ago

      Most do. It’s the only reason they finally somewhat caught on after a rough start when users had to download an app in order to read the code.

    • tacosanonymous@lemm.ee
      link
      fedilink
      arrow-up
      3
      ·
      3 days ago

      Every smartphone I’ve had does but every one of them has also asked if I want to follow the link rather than just doing it.

        • TheOakTree@lemm.ee
          link
          fedilink
          arrow-up
          3
          ·
          edit-2
          2 days ago

          That’s custom software on custom firmware, which is very extraneous to the average consumer…

          It’s also not a “released” phone in the sense that Google isn’t selling it in that state.