• 6 Posts
  • 94 Comments
Joined 29 天前
cake
Cake day: 2024年10月25日

help-circle

  • jia_tantohomeassistant@lemmy.world'Touch points' in HA
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    13 小时前

    People in my household have two uses for HA. The first one is automated lights: you walk in — the lights are on, you walk out — you forget that you were ever in the room, the second use is finer control (colour, brightness, temperature) using a simple dashboard for lights that have a physical on/off switch.

    I’ve provided integration to HomeKit so the tech savvier ones have set up their own automations such as turning on the lights in their room when their alarm goes off.

    In return I get to spy on everyone :3

    In my room I’ve gone crazy, controlling and automating literally everything, without nearly any physical controls.

    Fully agree with schizo! Not having to think about things like light, temperature, co2 and the likes is my goal too!




  • TLDR: they hacked a less secure network in range of their target network, then SSHed into a laptop on the less secure network and used it to hack the target network. Possibly even daisy chained less secure networks. The point of this was to not sit in a suspicious car next to your target while you brute force their wifi password (they have been caught previously).

    My question is: how do you get caught while hacking wpa2? I’m not an expert, but I assume you can get the data you need to do an offline bruteforce just by driving by and sitting at a red light a few times, which is not suspicious at all even if you have a laptop out. Or did they try to hack wpa3? If so, I assume it’s trivial to detect online bruteforce attempts and stop responding to them, or even just whitelist MAC addresses?