65
Comments (2)
sorted by:
1
pseudosapient 1 point ago +1 / -0

Assuming they were rigged, they'd be idiots to not put in a time limitation.

"if date > Nov 9th: delete_exploit()".

(Sure, you can set the clock back... which does absolutely nothing if it has already wiped itself.)


Really though, I wouldn't be looking at coding too hard. You'd have to be a bit of an idiot to put the rigging there. (Admittedly, there are some very stupid criminals out there.)

AFAICT they are using mostly off-the-shelf hardware and software. What OS version are they running on their frontend? Android in kiosk mode? Any known exploits or zero-days? USB descriptor parsing and network discovery are two classics...

What protocol are they using for communication? TCP over ethernet or somesuch? Is it encrypted on the link? Authenticated at least?

Etc.

It's far less obvious to leave a vendor exploit unpatched than to have your application code have a blatent issue.

1
WingsOfLiberty 1 point ago +1 / -0

They do connect to the internet. It may not be on them at all.