PC Ekspert Forum

PC Ekspert Forum (https://forum.pcekspert.com/index.php)
-   Razno (https://forum.pcekspert.com/forumdisplay.php?f=13)
-   -   Privatnost i sigurnost podataka i korisnika (https://forum.pcekspert.com/showthread.php?t=322402)

tomek@vz 24.10.2025. 22:29

Auch...
Citiraj:


Hackers have been spreading malware through more than 3,000 YouTube videos advertising cracked software and game hacks, cybersecurity firm Check Point warned this week. The campaign, active since at least 2021, tripled its video production in 2025. The videos promoted free versions of Adobe Photoshop, FL Studio, Microsoft Office, and game cheats for titles like Roblox. Fake comments created the appearance of legitimacy, the researchers found.

Users who downloaded archives from Dropbox, Google Drive, or MediaFire were instructed to disable Windows Defender before opening files. The downloads contained malware including Lumma and Rhadamanthys, which steal passwords and cryptocurrency wallet information. The hackers hijacked existing accounts and created new ones. One compromised channel with 129,000 subscribers posted a cracked Photoshop video that reached 291,000 views. Another video for FL Studio received over 147,000 views.
Nazalost ponovni dokaz da ljudska glupost,naivnost i pohlepa (s obje strane) nemaju granica.

medo 24.10.2025. 23:01

Citiraj:

Autor Bono (Post 3827334)
Koji model fortija vrtis doma? 😀

Sent from my SM-S931B using Tapatalk


40F koji uskoro ide u decommision. Stiže 70G :)

Bono 24.10.2025. 23:38

Citiraj:

Autor medo (Post 3827340)
40F koji uskoro ide u decommision. Stiže 70G :)

Njega muci 2gb rama, bas su klosari sa tim ramom, procesora ima koliko hoces, a skrtare na ramu. Makar za po kuci je valjda ok, 70g je ok, ima 4gb rama, a 90g je jos bolji jer ima 2.5/5/10gbit wan i 8gb rama.

Sent from my SM-S931B using Tapatalk

medo 25.10.2025. 00:12

Vidi koliko koštaju licence za 90G :D

Bono 25.10.2025. 01:36

Za kucu nije, ali za firmu ovisi sta stitis.

Sent from my SM-S931B using Tapatalk

tomek@vz 25.10.2025. 07:59

MS daje svoj doprinos kotroli homeoffice radnika...


Citiraj:

Citiraj:

Microsoft Teams is about to deal a heavy blow to those who like to work from home for peace and quiet. In a new feature update rolling out December 2025, the platform will track a worker's location using the office Wi-Fi, to see whether you're actually there or not. From a boss' perspective, this would eliminate any of that confusion as to where your team actually is. But for those people who have found their own sanctuary of peaceful productivity by working from home, consider this a warning that Teams is about to tattle on you.
According to the Microsoft 365 roadmap: "When users connect to their organization's Wi-Fi, Teams will automatically set their work location to reflect the building they are working in." The location of that worker will apparently update automatically upon connecting.

It's set to launch on Windows and macOS, with rollout starting at the end of this year. "This feature will be off by default," notes Microsoft. But "tenant admins will decide whether to enable it and require end-users to opt-in."
Analiza Amazon fijaska:
Citiraj:

Citiraj:

The outage that hit Amazon Web Services and took out vital services worldwide was the result of a single failure that cascaded from system to system within Amazon's sprawling network, according to a post-mortem from company engineers. [...] Amazon said the root cause of the outage was a software bug in software running the DynamoDB DNS management system. The system monitors the stability of load balancers by, among other things, periodically creating new DNS configurations for endpoints within the AWS network. A race condition is an error that makes a process dependent on the timing or sequence events that are variable and outside the developers' control. The result can be unexpected behavior and potentially harmful failures.

In this case, the race condition resided in the DNS Enactor, a DynamoDB component that constantly updates domain lookup tables in individual AWS endpoints to optimize load balancing as conditions change. As the enactor operated, it "experienced unusually high delays needing to retry its update on several of the DNS endpoints." While the enactor was playing catch-up, a second DynamoDB component, the DNS Planner, continued to generate new plans. Then, a separate DNS Enactor began to implement them. The timing of these two enactors triggered the race condition, which ended up taking out the entire DynamoDB. [...] The failure caused systems that relied on the DynamoDB in Amazon's US-East-1 regional endpoint to experience errors that prevented them from connecting. Both customer traffic and internal AWS services were affected.

The damage resulting from the DynamoDB failure then put a strain on Amazon's EC2 services located in the US-East-1 region. The strain persisted even after DynamoDB was restored, as EC2 in this region worked through a "significant backlog of network state propagations needed to be processed." The engineers went on to say: "While new EC2 instances could be launched successfully, they would not have the necessary network connectivity due to the delays in network state propagation." In turn, the delay in network state propagations spilled over to a network load balancer that AWS services rely on for stability. As a result, AWS customers experienced connection errors from the US-East-1 region. AWS network functions affected included the creating and modifying Redshift clusters, Lambda invocations, and Fargate task launches such as Managed Workflows for Apache Airflow, Outposts lifecycle operations, and the AWS Support Center.

Amazon has temporarily disabled its DynamoDB DNS Planner and DNS Enactor automation globally while it fixes the race condition and add safeguards against incorrect DNS plans. Engineers are also updating EC2 and its network load balancer.

Further reading: Amazon's AWS Shows Signs of Weakness as Competitors Charge Ahead

I kako te susjedov WIFI moze pratiti:


Citiraj:

People often worry about being tracked through their wireless devices, especially when using public Wi-Fi networks. However, researchers have discovered multiple methods to detect and potentially track individuals via Wi-Fi, even if they are not carrying any devices, and the widespread presence of Wi-Fi networks makes these surveillance tactics potentially universal.
According to a recent study (PDF) from the Karlsruhe Institute of Technology, any Wi-Fi router that supports Wi-Fi 5 (802.11ac) or newer can be used to observe people within range. The findings raise serious privacy concerns.
> Techspot

tomek@vz 25.10.2025. 23:44

Citiraj:

Security expert Troy Hunt just added a huge new dataset to the Have I Been Pwned database containing 183 million new email accounts with leaked login details. It was collected with the help of Synthient, a security product that helps detect and block bad actors on platforms. (Have I Been Pwned is a great way to stay on top of fresh data breaches!)
According to the HIBP announcement post, the data includes both email addresses and their corresponding passwords, along with all the websites they’ve been entered into. The data was cleansed before inclusion into the database so that only unique accesses were included (i.e., no duplicate entries).
This brings the total number of accounts that have been “pwned” (i.e., affected by verifiable data leaks) to over 15.3 billion. Yikes.


> PcWorld

tomek@vz 26.10.2025. 06:25

Citiraj:

Microsoft on Thursday released out-of-band security updates to patch a critical-severity Windows Server Update Service (WSUS) vulnerability with a proof-of-concept (Poc) exploit publicly available and has come under active exploitation in the wild.
The vulnerability in question is CVE-2025-59287 (CVSS score: 9.8), a remote code execution flaw in WSUS that was originally fixed by the tech giant as part of its Patch Tuesday update published last week.
Three security researchers, MEOW, f7d8c52bec79e42795cf15888b85cbad, and Markus Wulftange with CODE WHITE GmbH, have been acknowledged for discovering and reporting the bug.


> hackernews

Neo-ST 26.10.2025. 11:07

Mislili ste da je Chat Control mrtav?

https://www.reddit.com/r/europe/s/UiTpW4ohI5

https://www.reddit.com/r/europe/s/qTpqYPTMww

tomek@vz 27.10.2025. 07:12

Citiraj:

Artificial Intelligence has advanced to the point where systems can now clone voices convincingly in real time, letting attackers mimic anyone during a live conversation. The breakthrough removes earlier limits that depended on prerecorded clips or slow processing, raising new cybersecurity and identity verification concerns.
Cybersecurity firm NCC Group has demonstrated that combining open-source AI tools with off-the-shelf hardware can generate real-time voice deepfakes with minimal latency. The technique, dubbed "deepfake vishing," uses AI models trained on samples of a target's voice to produce live impersonations that operators activate via a start button on a tailored web interface.


> Techspot

Colop 27.10.2025. 12:52

Citiraj:

Autor tomek@vz (Post 3827650)




Znači u budućnosti će sa članovima obitelji trebati dogovoriti password koji moraju reći kada te budu zvali iz zatvora u Turskoj da im platiš jamčevinu.

mkey 27.10.2025. 20:24

PA ima na jobito onaj frajer koji maltretira Indijske scammere. Pred već barem pola godine je bio složio svoj garažni call centar gdje ti njegovi "AI" botovi dovode indijce do ludila i to uživo. Ne znam koliko je roknuo u hardware, ali mislim da je imao istovremeno 12 linija koje roštaju cijeli dan. Kit Boga, kako li se zove.

tomek@vz 27.10.2025. 21:39

Citiraj:

Autor mkey (Post 3827799)
PA ima na jobito onaj frajer koji maltretira Indijske scammere. Pred već barem pola godine je bio složio svoj garažni call centar gdje ti njegovi "AI" botovi dovode indijce do ludila i to uživo. Ne znam koliko je roknuo u hardware, ali mislim da je imao istovremeno 12 linija koje roštaju cijeli dan. Kit Boga, kako li se zove.


Hilarious :D



mkey 27.10.2025. 22:15

To je taj. Trebaš vidjeti video u kojem se indijac dere "DO NOT REDEEM!!11! DO NOT REDEEEMM!11!!" dok frajer redeema gift card od 500$. Komedija.

Bono 27.10.2025. 23:34

Indijci kad namire lovu nikad ne odustaju.
https://youtube.com/shorts/_TaS080vGKc

Sent from my SM-S931B using Tapatalk

tomek@vz 28.10.2025. 21:22

Iduci velik problem o kojem nitko ne prica:


Citiraj:

After last week's major AWS outage took Signal along with it, Elon Musk was quick to criticize the encrypted messaging app's reliance on big tech. But Signal president Meredith Whittaker argues that the company didn't have any other choice but to use AWS or another major cloud provider.

"The problem here is not that Signal 'chose' to run on AWS," Whittaker writes in a series of posts on Bluesky. "The problem is the concentration of power in the infrastructure space that means there isn't really another choice: the entire stack, practically speaking, is owned by 3-4 players."

In the thread, Whittaker says the number of people who didn't realize Signal uses AWS is "concerning," as it indicates they aren't aware of just how concentrated the cloud infrastructure industry is. "The question isn't 'why does Signal use AWS?'" Whittaker writes. "It's to look at the infrastructural requirements of any global, real-time, mass comms platform and ask how it is that we got to a place where there's no realistic alternative to AWS and the other hyperscalers."

domy_os 29.10.2025. 18:49

Citiraj:

In a post on his blog Small World, the computer programmer and electronics enthusiast Harishankar Narayanan detailed a startling find he made about his $300 smart vacuum: it was transmitting intimate data out of his home.
Citiraj:

“My robot vacuum was constantly communicating with its manufacturer, transmitting logs and telemetry that I had never consented to share,” Narayanan wrote. “That’s when I made my first mistake: I decided to stop it.”
https://futurism.com/robots-and-mach...m-broadcasting

Ponavlja se slučaj iz 2017...

https://thehackernews.com/2017/07/ir...a-vacuums.html

mkey 29.10.2025. 20:20

Mislim da je prvi znak da nešto nije u redu kada ti usisavač traži da se spoji na net :D

tomek@vz 30.10.2025. 11:38

Citiraj:

Trend Micro says the attackers are using WSL to be able to launch the ELF executable on a Windows device and to bypass traditional Windows security software.
"In this case, the threat actors were able to run the Linux encryptor on Windows systems by taking advantage of the Windows Subsystem for Linux (WSL), a built-in feature that allows Linux binaries to execute natively on Windows without requiring a virtual machine," Trend Micro said.

>> Techradar
>> WebProNews


Opet problemi sa npm libovima:


Citiraj:

Ten malicious packages mimicking legitimate software projects in the npm registry download an information-stealing component that collects sensitive data from Windows, Linux, and macOS systems.
The packages were uploaded to npm on July 4, and remained undetected for a long period due to multiple layers of obfuscation that helped escape standard static analysis mechanisms.
According to researchers at cybersecurity company Socket, the ten packages counted nearly 10,000 downloads and stole credentials from system keyrings, browsers, and authentication services.
At the time of writing, the packages are still available, despite Socket reporting them to npm:
  1. typescriptjs
  2. deezcord.js
  3. dizcordjs
  4. dezcord.js
  5. etherdjs
  6. ethesjs
  7. ethetsjs
  8. nodemonjs
  9. react-router-dom.js
  10. zustand.js


> bleepingcomputer

mkey 30.10.2025. 14:30

Ovo je baš nezgodno. Zato ekipa i upozorava da čim više vanjskog softwera koristiš šanse da budeš naletio na neki scam rastu, pošto s vremenom netko može preuzet projekt i raditi ovakve pi*darije.

Bono 30.10.2025. 16:41

EY Data Leak - Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure

A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure.

The file's naming convention screamed SQL Server backup (.BAK format), which typically contains full database dumps, including schemas, user data, and, crucially, embedded secrets such as API keys, credentials, and authentication tokens.

A simple HEAD request designed by researchers to retrieve metadata without downloading content revealed a massive size: 4 terabytes of data, which is equivalent to millions of documents or the contents of an entire library.

https://cybersecuritynews.com/ey-data-leak/

Sent from my SM-S931B using Tapatalk

tomek@vz 31.10.2025. 08:26

Citiraj:

Autor Bono (Post 3828317)
EY Data Leak - Massive 4TB SQL Server Backup Exposed Publicly on Microsoft Azure

A massive 4TB SQL Server backup file belonging to global accounting giant Ernst & Young (EY) was discovered publicly accessible on Microsoft Azure.

The file's naming convention screamed SQL Server backup (.BAK format), which typically contains full database dumps, including schemas, user data, and, crucially, embedded secrets such as API keys, credentials, and authentication tokens.

A simple HEAD request designed by researchers to retrieve metadata without downloading content revealed a massive size: 4 terabytes of data, which is equivalent to millions of documents or the contents of an entire library.

https://cybersecuritynews.com/ey-data-leak/

Sent from my SM-S931B using Tapatalk


auch....

tomek@vz 31.10.2025. 08:47

Na ovo se moram malo nasmijati :D


Citiraj:

Someone recently managed to get on a Microsoft Teams call with representatives from phone hacking company Cellebrite, and then leaked a screenshot of the company's capabilities against many Google Pixel phones, according to a forum post about the leak and 404 Media's review of the material. The leak follows others obtained and verified by 404 Media over the last 18 months. Those leaks impacted both Cellebrite and its competitor Grayshift, now owned by Magnet Forensics. Both companies constantly hunt for techniques to unlock phones law enforcement have physical access to.

"You can Teams meeting with them. They tell everything. Still cannot extract esim on Pixel. Ask anything," a user called rogueFed wrote on the GrapheneOS forum on Wednesday, speaking about what they learned about Cellebrite capabilities. GrapheneOS is a security- and privacy-focused Android-based operating system. rogueFed then posted two screenshots of the Microsoft Teams call. The first was a Cellebrite Support Matrix, which lays out whether the company's tech can, or can't, unlock certain phones and under what conditions. The second screenshot was of a Cellebrite employee. According to another of rogueFed's posts, the meeting took place in October. The meeting appears to have been a sales call. The employee is a "pre sales expert," according to a profile available online.

The Support Matrix is focused on modern Google Pixel devices, including the Pixel 9 series. The screenshot does not include details on the Pixel 10, which is Google's latest device. It discusses Cellebrite's capabilities regarding 'before first unlock', or BFU, when a piece of phone unlocking tech tries to open a device before someone has typed in the phone's passcode for the first time since being turned on. It also shows Cellebrite's capabilities against after first unlock, or AFU, devices. The Support Matrix also shows Cellebrite's capabilities against Pixel devices running GrapheneOS, with some differences between phones running that operating system and stock Android. Cellebrite does support, for example, Pixel 9 devices BFU. Meanwhile the screenshot indicates Cellebrite cannot unlock Pixel 9 devices running GrapheneOS BFU. In their forum post, rogueFed wrote that the "meeting focused specific on GrapheneOS bypass capability." They added "very fresh info more coming."

Bono 31.10.2025. 09:21

Moraju ljudi prodati svoj software.

Sent from my SM-S931B using Tapatalk

Night 31.10.2025. 11:11

Direkt link na screenshot : https://files.catbox.moe/80kwmt.jpg

Sad se nameće (retoričko) pitanje zašto Pixela sa standardnim Google provided OSom Cellebrite može otključati, a onoga sa Grapheneom ne može. Zašto Google ne začepi tu rupu koja je već dugo vremena poznata, osim ako je namjerno dopušta.

mkey 31.10.2025. 19:09

Retorički odgovor: to su sve teorije zavjere.

Visage 31.10.2025. 22:22

Leaked documents expose deep ties between Israeli army and Microsoft

Citiraj:

The documents additionally indicate that the “Rolling Stone” system, which the army uses to manage the population registry and movement of Palestinians in the West Bank and Gaza, is maintained by Microsoft Azure. Azure is also used in a highly classified unit inside the Israeli Prime Minister’s Office, where Microsoft employees with security clearance are required to sign off and oversee the provision of cloud services.

...

tomek@vz 01.11.2025. 09:35

Prilično detaljno dokumentirano, topla preporuka:


Citiraj:

Key Points / Summary
  • 2 exposed AWS keys on public-facing websites revealed 70+ TB of sensitive information and infrastructure across hundreds of buckets.
  • Pointless AWS key encryption easily defeated.
  • Tableau backdoor made it possible to log in as anyone without a password, including the server admin. This exposed countless internal projects, financial reports, and dealer dashboards.
  • Exposed Azuga API key compromised test drive fleet management system.
If you are in the US and ask your friends and family if they have heard of “Tata Motors”, they would likely say no. However, if you go overseas, Tata Motors and the Tata Group in general are a massive, well-known conglomerate. Back in 2023, I took my hacking adventures overseas and found many vulnerabilities with Tata Motors. This post covers 4 of the most impactful findings I discovered that I am finally ready to share today. Let’s dive in!
Note that all secrets/credentials shown have been rotated, meaning they are no longer valid and cannot be used anymore. Additionally, no substantial amounts of data were downloaded as part of any testing, nor was there any obvious evidence of malicious access.

> Hacking India’s largest automaker: Tata Motors

tomek@vz 01.11.2025. 10:08

Citiraj:

The U.S. Cybersecurity and Infrastructure Security Agency has added a critical Linux kernel vulnerability to its Known Exploited Vulnerabilities catalog, warning that threat actors are actively leveraging the security vulnerability in ransomware campaigns targeting organizations worldwide.
The vulnerability, tracked as CVE-2024-1086, represents a significant threat to Linux-based systems and requires immediate attention from cybersecurity teams.
CVE-2024-1086 is a use-after-free vulnerability affecting the netfilter: nf_tables component within the Linux kernel.
This type of security weakness occurs when a program continues to use a memory pointer after the associated memory has been freed, allowing attackers to manipulate memory allocations and potentially execute arbitrary code with elevated privileges.
The vulnerability enables threat actors to achieve local privilege escalation, granting unauthorized administrative access to compromised systems.
The vulnerability is categorized under CWE-416, a common weakness enumeration that specifically addresses use-after-free conditions.
These vulnerabilities are particularly dangerous because they can be exploited to bypass security controls and escalate privileges from a standard user account to root or administrator level.
Once attackers obtain elevated privileges, they can deploy ransomware payloads, exfiltrate sensitive data, establish persistent access, or conduct other malicious activities across the compromised infrastructure.


> CISA Alerts on Linux Kernel Vulnerability Exploited in Ransomware Attacks

tomek@vz 02.11.2025. 07:07

Citiraj:

The address bar/ChatGPT input window in OpenAI's browser ChatGPT Atlas "could be targeted for prompt injection using malicious instructions disguised as links," reports SC World, citing a report from AI/agent security platform NeuralTrust:
Citiraj:

NeuralTrust found that a malformed URL could be crafted to include a prompt that is treated as plain text by the browser, passing the prompt on to the LLM. A malformation, such as an extra space after the first slash following "https:" prevents the browser from recognizing the link as a website to visit. Rather than triggering a web search, as is common when plain text is submitted to a browser's address bar, ChatGPT Atlas treats plain text as ChatGPT prompts by default.

An unsuspecting user could potentially be tricked into copying and pasting a malformed link, believing they will be sent to a legitimate webpage. An attacker could plant the link behind a "copy link" button so that the user might not notice the suspicious text at the end of the link until after it is pasted and submitted. These prompt injections could potentially be used to instruct ChatGPT to open a new tab to a malicious website such as a phishing site, or to tell ChatGPT to take harmful actions in the user's integrated applications or logged-in sites like Google Drive, NeuralTrust said.

Last month browser security platform LayerX also described how malicious prompts could be hidden in URLs (as a parameter) for Perplexity's browser Comet. And last week SquareX Labs demonstrated that a malicious browser extension could spoof Comet's AI sidebar feature and have since replicated the proof-of-concept (PoC) attack on Atlas.

But another new vulnerability in ChatGPT Atlas "could allow malicious actors to inject nefarious instructions into the artificial intelligence (AI)-powered assistant's memory and run arbitrary code," reports The Hacker News, citing a report from browser security platform LayerX:
Citiraj:

"This exploit can allow attackers to infect systems with malicious code, grant themselves access privileges, or deploy malware," LayerX Security Co-Founder and CEO, Or Eshed, said in a report shared with The Hacker News. The attack, at its core, leverages a cross-site request forgery (CSRF) flaw that could be exploited to inject malicious instructions into ChatGPT's persistent memory. The corrupted memory can then persist across devices and sessions, permitting an attacker to conduct various actions, including seizing control of a user's account, browser, or connected systems, when a logged-in user attempts to use ChatGPT for legitimate purposes....

"What makes this exploit uniquely dangerous is that it targets the AI's persistent memory, not just the browser session," Michelle Levy, head of security research at LayerX Security, said. "By chaining a standard CSRF to a memory write, an attacker can invisibly plant instructions that survive across devices, sessions, and even different browsers. In our tests, once ChatGPT's memory was tainted, subsequent 'normal' prompts could trigger code fetches, privilege escalations, or data exfiltration without tripping meaningful safeguards...."

LayerX said the problem is exacerbated by ChatGPT Atlas' lack of robust anti-phishing controls, the browser security company said, adding it leaves users up to 90% more exposed than traditional browsers like Google Chrome or Microsoft Edge. In tests against over 100 in-the-wild web vulnerabilities and phishing attacks, Edge managed to stop 53% of them, followed by Google Chrome at 47% and Dia at 46%. In contrast, Perplexity's Comet and ChatGPT Atlas stopped only 7% and 5.8% of malicious web pages.
From The Conversation:
Citiraj:

Sandboxing is a security approach designed to keep websites isolated and prevent malicious code from accessing data from other tabs. The modern web depends on this separation. But in Atlas, the AI agent isn't malicious code — it's a trusted user with permission to see and act across all sites. This undermines the core principle of browser isolation.


Ponekad je gluplje i jednostavnije - bolje.

OuttaControl 02.11.2025. 11:09

https://www.instagram.com/reel/DPHFw...YybGJsdTRsYg==

TLDR
Auto skuplja podatke o voznji, GM ih prodaje data brokeru, data broker ih prodaje osiguranju.
U ovom slucaju covjeku je skocila cijena osiguranja 80% zato jer je imao puno "near crash events at night" crash events at night su bile njegove macke koje izlete pred auto svaku večer jer je dosao kuci. Inace prate kad vozis, koliko vozis, kako vozis, gdje vozis, kako kocis, kako ubrzavas itd. itd.
GM kaze sve pise u terms and conditions :)

Poanta je i kako je on kaznjen, za krive podatke i netocne informacije, tako da nam sljeduje i gore sa AI radnicima, al korporacije nije briga, njima je to profit :)

mkey 02.11.2025. 14:53

Nije istina da ih nije briga, itekako ih je briga i milo im je.

Matta 02.11.2025. 14:59

Citiraj:

Autor OuttaControl (Post 3828680)
https://www.instagram.com/reel/DPHFw...YybGJsdTRsYg==

TLDR
Auto skuplja podatke o voznji, GM ih prodaje data brokeru, data broker ih prodaje osiguranju.
U ovom slucaju covjeku je skocila cijena osiguranja 80% zato jer je imao puno "near crash events at night" crash events at night su bile njegove macke koje izlete pred auto svaku večer jer je dosao kuci. Inace prate kad vozis, koliko vozis, kako vozis, gdje vozis, kako kocis, kako ubrzavas itd. itd.
GM kaze sve pise u terms and conditions :)

Poanta je i kako je on kaznjen, za krive podatke i netocne informacije, tako da nam sljeduje i gore sa AI radnicima, al korporacije nije briga, njima je to profit :)

Ovaj put sam si dao vremena i odgledao čitav video. Nigdje se dokazano ne tvrdi da je to istina nego tip(ovi) zaključuje da je to razlog zašto mu je osiguranje poskupilo.
U slučaju da je to istina osiguranje bi trebalo navesti razloge poskupljenja i ovaj tip bi to pokazao na videu.
Nadalje, da je to istina, pokazali bi i ljude kojima osiguranje NIJE poskupilo a voze isti automobil a nemaju sve gore navedene "prijestupe".
Ne kažem da sve to ne bi moglo biti tako ali ovaj gore video ocjenjujem kao clickbait.
P.S.
Još jedan razlog - "Near collision" ne znači ništa, palo bi na sudu samo tako. Jer j*bati i skoro j*ebati nije ni približno isto. :D

mkey 02.11.2025. 15:09

Evo tu imaš dosta više detalja. Slobodno ti dovodi u pitanje sve što želiš, ali mora ti biti jasno da 99% instagram korisnika ima attention span od max dvije minute.
https://web.archive.org/web/20250906...a-consent.html


Bokte mazo, moraš skinuti video da vidiš koliko traje. Kakve su to legende. Dakle, traje 2:59, vjerojatno se nisu usudili ići na 3 minute jer bi to bio insta mind blown.

Libertus 02.11.2025. 17:11

Citiraj:

Autor OuttaControl (Post 3828680)
https://www.instagram.com/reel/DPHFw...YybGJsdTRsYg==

TLDR
Auto skuplja podatke o voznji, GM ih prodaje data brokeru, data broker ih prodaje osiguranju.
U ovom slucaju covjeku je skocila cijena osiguranja 80% zato jer je imao puno "near crash events at night" crash events at night su bile njegove macke koje izlete pred auto svaku večer jer je dosao kuci. Inace prate kad vozis, koliko vozis, kako vozis, gdje vozis, kako kocis, kako ubrzavas itd. itd.
GM kaze sve pise u terms and conditions :)

Poanta je i kako je on kaznjen, za krive podatke i netocne informacije, tako da nam sljeduje i gore sa AI radnicima, al korporacije nije briga, njima je to profit :)

Upitno da li je istina ili nije, ali svejedno dobar primjer za ove koji "nemaju što skrivati" pa im je svejedno da li im država snima i skenira sve poruke koje primaju i šalju.

OuttaControl 02.11.2025. 17:34

Pitao sam chatgpt za factcheck prije postanja rekao mi je "substantially supported by credible sources" good enough for me.

Citiraj:

Autor Libertus (Post 3828734)
Upitno da li je istina ili nije, ali svejedno dobar primjer za ove koji "nemaju što skrivati" pa im je svejedno da li im država snima i skenira sve poruke koje primaju i šalju.



Tocno sam na te ciljao :) tako ce bit i sa zdravstvom pa bolesne ljude nece osigurati, to se u biti vec sad dogadja, manje u nas nego u ameriki

Bono 02.11.2025. 17:35

Takvima nema pomoci...na njihovu nesrecu nisu najbistriji i oni ocekuju od drzave da se pobrine za njih. Takvi najcesce kazu, spijuniraju te ionako cim imas smartphone.
A nemojte misliti da je kod nas isto zdravstvo zagarantirano, moglo bi i kod nas biti kao u americi. I kod nas je vec bilo, ako osiguranje sazna da imas rak ne zeli te osigurati, pa sad ti zamisli koliko su im vrijedni ti podaci.

Ima i onih koji dobrovoljno dijele, kao i u skandinaviji koji su si dobrovoljno ukljucili na kreditnim karticama pracenje CO2 kod kupnje.

Citiraj:

Several car companies in the USA are collecting driving data and sharing it with insurance companies, often through third-party data brokers. Here are some of the key players involved:

General Motors (GM): GM, along with its subsidiary OnStar, has been accused of collecting driving data through its OnStar Smart Driver technology and sharing it with data brokers like LexisNexis and Verisk Analytics. This data is then sold to insurance companies, which use it to assess risk and set premiums. GM has faced multiple lawsuits and investigations over these practices 1•2•3.

Toyota: Toyota has also been under scrutiny for its data collection and sharing practices. The company has been asked to produce information about how it sells and shares data with Connected Analytic Services, LLC (CAS), an affiliate of Toyota Insurance Management Solutions USA, LLC. This data is reportedly used by insurance companies to price premiums 4•5.

Ford: While Ford has stated that it does not sell connected vehicle data to data brokers, it has previously shared data with insurers on behalf of customers who wanted usage-based insurance policies. However, Ford decided to discontinue this practice 4.

Allstate and Arity: Allstate, through its subsidiary Arity, collects a wide range of driving data, including geolocation, driving habits, and behavior, from connected cars and smartphone apps. This data is then sold to third parties, including insurance companies, to justify higher car insurance premiums or to target advertisements 6•7.

Other Automakers: Several other automakers, including Hyundai and Mitsubishi, have been noted for collecting and potentially sharing driving data. The extent of this data sharing and the specific insurance companies involved are not always clearly disclosed 5.

These practices have sparked outrage among drivers and led to legal actions in multiple states. Drivers are concerned about privacy invasions and the potential for higher insurance premiums based on data they were not aware was being collected and shared.
Sent from my SM-S931B using Tapatalk

medo 02.11.2025. 20:09

Privatnost i sigurnost podataka i korisnika
 
Citiraj:

Autor Bono (Post 3828739)
A nemojte misliti da je kod nas isto zdravstvo zagarantirano, moglo bi i kod nas biti kao u americi. I kod nas je vec bilo, ako osiguranje sazna da imas rak ne zeli te osigurati, pa sad ti zamisli koliko su im vrijedni ti podaci.

Malo je OT ali možda nekome bude korisno.

Imao sam rak. Mislio sam da me nitko neće osigurati ali evo iz prve ruke sam se pozitivno iznenadio u razgovoru s nekim osiguravateljima.

Prema njihovim statistikama određeni postotak preživjelih od raka su manji rizik nego prosječni građani jer se puno više paze (prehrana, kretanje, izbjegavanje poroka…).

Bono 02.11.2025. 20:12

Croatia osiguranje isto?

https://www.index.hr/mobile/vijesti/...a/2709156.aspx

Sent from my SM-S931B using Tapatalk

tomek@vz 03.11.2025. 07:22

Ne spada direktno u ovu temu ali...


Citiraj:

"An engineer got curious about how his iLife A11 smart vacuum worked and monitored the network traffic coming from the device," writes Tom's Hardware.

"That's when he noticed it was constantly sending logs and telemetry data to the manufacturer — something he hadn't consented to."
Citiraj:

The user, Harishankar, decided to block the telemetry servers' IP addresses on his network, while keeping the firmware and OTA servers open. While his smart gadget worked for a while, it just refused to turn on soon after... He sent it to the service center multiple times, wherein the technicians would turn it on and see nothing wrong with the vacuum. When they returned it to him, it would work for a few days and then fail to boot again... [H]e decided to disassemble the thing to determine what killed it and to see if he could get it working again...

[He discovered] a GD32F103 microcontroller to manage its plethora of sensors, including Lidar, gyroscopes, and encoders. He created PCB connectors and wrote Python scripts to control them with a computer, presumably to test each piece individually and identify what went wrong. From there, he built a Raspberry Pi joystick to manually drive the vacuum, proving that there was nothing wrong with the hardware. From this, he looked at its software and operating system, and that's where he discovered the dark truth: his smart vacuum was a security nightmare and a black hole for his personal data.

First of all, it's Android Debug Bridge, which gives him full root access to the vacuum, wasn't protected by any kind of password or encryption. The manufacturer added a makeshift security protocol by omitting a crucial file, which caused it to disconnect soon after booting, but Harishankar easily bypassed it. He then discovered that it used Google Cartographer to build a live 3D map of his home. This isn't unusual, by far. After all, it's a smart vacuum, and it needs that data to navigate around his home. However, the concerning thing is that it was sending off all this data to the manufacturer's server. It makes sense for the device to send this data to the manufacturer, as its onboard SoC is nowhere near powerful enough to process all that data. However, it seems that iLife did not clear this with its customers.

Furthermore, the engineer made one disturbing discovery — deep in the logs of his non-functioning smart vacuum, he found a command with a timestamp that matched exactly the time the gadget stopped working. This was clearly a kill command, and after he reversed it and rebooted the appliance, it roared back to life.




Sva vremena su GMT +2. Sada je 04:46.

Powered by vBulletin®
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
© 1999-2024 PC Ekspert - Sva prava pridržana ISSN 1334-2940
Ad Management by RedTyger