• MoogleMaestro@lemmy.zip
    link
    fedilink
    English
    arrow-up
    33
    ·
    10 days ago

    It’s a bit strange that this code requires a binary blob to verify, I think people who want to experiment with this should take some caution as it could be an exploit-in-an-exploit (user is highlighting a real exploit, but also trying to take advantage of people testing by effectively installing a back-door.) I won’t say that’s happening for sure, but take running this yourself with extreme caution.

      • MoogleMaestro@lemmy.zip
        link
        fedilink
        English
        arrow-up
        1
        ·
        8 days ago

        I had always heard “binary blob” said when it came to opaque code, but I see that blob is what is used to describe unexplained binary data as a whole in database lingo, so I’m willing to say your usage of it is probably more correct than mine here, assuming the binary data isn’t an actual program (afaik there’s no elf-file like characteristics but who knows.). 😇