this post was submitted on 11 Jul 2024
273 points (97.6% liked)
Technology
59099 readers
3192 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
It's possible, but with copy protections, it's incredibly unlikely. You'd run an app on your computer or TV to decrypt and view the media, just like you do with Netflix or whatever.
that wouldn't stop someone from dropping a "media player" on the drive with your logo on it that's actually malware. People unfamiliar with how it's supposed to work would plug that in and run it without even thinking about it. I guess you could have the machine format the drive every time it comes back and have it test for counterfeits to prevent that though now that I think about it more.
Yup, that's the plan. You turn it in, it reimages it to whatever the next customer is likely to need, and if a customer asks for something out of left-field, it would reflash and take a bit longer.
Flashing on return is essential because it checks whether the returned item is still in working order, so it really wouldn't be an issue.
The USB port of the machine is also an attack vector.
Eh, I suppose, but they could design the USB drive really hard to infect. The more narrow your use-case, the more options you have to secure it.
They could even limit it to just HDMI, which would probably be a lot harder to attack since HDMI doesn't support much besides audio and video.