this post was submitted on 14 Jan 2024
1105 points (97.3% liked)
linuxmemes
21189 readers
710 users here now
Hint: :q!
Sister communities:
- LemmyMemes: Memes
- LemmyShitpost: Anything and everything goes.
- RISA: Star Trek memes and shitposts
Community rules (click to expand)
1. Follow the site-wide rules
- Instance-wide TOS: https://legal.lemmy.world/tos/
- Lemmy code of conduct: https://join-lemmy.org/docs/code_of_conduct.html
2. Be civil
- Understand the difference between a joke and an insult.
- Do not harrass or attack members of the community for any reason.
- Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
- Bigotry will not be tolerated.
- These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
3. Post Linux-related content
- Including Unix and BSD.
- Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of
sudo
in Windows. - No porn. Even if you watch it on a Linux machine.
4. No recent reposts
- Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
Please report posts and comments that break these rules!
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
How would open source software be used to disrupt communications? What am I not understanding here?
Different countries regulate the radio spectrum differently, so transmitting on a certain frequency might be legal in country A but illegal in country B. They don't bother making different radios for different countries, though; instead, they just build hardware capable of transmitting on all the frequencies and then restrict what it can do via the firmware. The argument goes, if they allow device owners to modify the firmware, then they might modify the radio to transmit illegally. Never mind that there are myriad other ways an attacker could do that, that are almost as cheap and easy...
There are easier ways to cause chaos:
Get a cheap phone.
Write some code to have it play, at the loudest possible volume, a pure sine wave at 18000hz to 19000hz, just outside of the range nearly all humans can consciously be aware of hearing a sound, but within the range that prolonged exposure to this sound can cause humans to become panicked, irritable, delusional, sometimes even hallucinatory, and have immense difficulty sleeping.
Leave the phone somewhere.
Obviously, do not actually do this.
Probably this would be considered terrorism, and get you in about as much trouble as fucking about with your conception of what could be used as a sort of crap tier EM jammer.
I'm saving this for later.
You don't need a phone at all to do this. Or code. Or silicon. Just a cheap RC oscillator circuit tuned to that frequency and connected to a battery and a tweeter speaker.
Edit: where's RadioShack when you need it?
AliExpress bots have probably already read this comment and put together a 'panic inducer top quality rechargeable usb frequency tweeter for wedding, birthday, sonic warfare, corporate and special event' which you can buy for five dollars
Driven out of business by the CIA and FBI to prevent this from being easily doable no doubt!
(kidding, obviously lol)
What app can do this? And do phone speakers even reach this range?
To the best of my knowledge,
no, which is why I said write some code,
And,
it technically depends but probably most speakers for most consumer grade hardware can do this, though I do not know about optimal decibel levels at such decibel ranges to be necessary to induce the effect, relative to time, battery life, energy cost, etc.
I will again repeat DO NOT DO THIS.
It legitimately could be considered terrorism.
In additional to the other comment, I think there's also a traditional fear of corruption in open source. If the code is public then malicious parties are free to read and take advantage of holes in the security. Secondly it would be possible to contribute code with secret functionality that goes unnoticed. These are fairly easily debunked but seem to remain in people's heads.
Ugh I hate these arguments about giving bad actors easier access. Bad actors are going to figure out flaws and security holes whether it's open source or not. Security through obfuscation is a temporary measure and having more eyes on the source means more chances for good actors to find flaws and publicize them for fixes.