@T156
@lemmy.worldOr it turns out you accidentally left caps lock on, and now you're locked out for a few minutes.
Big "if" though, and that would be contingent on the fact that the data is desirable enough that other people are willing and able to host it long-term, even before being able to find a country like that, and set up a torrent. I've a few torrents that are dead now, for example, because people weren't that interested in keeping a copy of what they pointed to/the tracker no longer works.
You'd still need to share the torrent to spread it anyhow, and that runs into the DMCA issue all over again. The pirate bay only hosted torrents and magnet links, but it still got shut down for piracy, way back when. "facilitating pervasive online infringement [of copyright]" is something that can get you shut down, as Limewire found out.
A fair few sites will also wipe image/EXIF metadata for safety reasons, since photo metadata can include things like the location where the photo was taken.
Although Google making Chrome almost certainly had a part in it. For a while, you couldn't use Google without a "try our new Chrome browser!" pop up in the corner, and there aren't many who don't use Google.
Firefox doesn't have the same advertising reach, and neither do they have the reputation of Google, as a big company to help them in the eyes of laymen. Basically everyone's heard of Google, but less so Mozilla. You'd may as well ask them to install Konqueror, or Netscape for all the good that it would do.
Or, session cookies. They don't need special privilege to access, and if you grab all of someone's cookies, you can probably get some valid session cookies for logged in accounts just by checking for some common domains in one/by keyword.
From there, it would be trivial to get into email, social media, and other accounts to do other things with.
It would be trivial to add a "please click 'yes' to the UAC prompt to allow verification" screen, so that isn't really going to stop anyone.
I've seen a bit of office malware in the past that did that, where it had a bunch of images instructing you to enable macros and that.
That's probably why they "helpfully" include a little picture of the symbol on the key, so you know what it looks like.
This feature is extremely insecure now that there’s several AIs that can replicate voices. If a scammer calls you and you say a few words (like if you say “hello” and “sorry, I think you’ve got the wrong number”), a recording of that can be enough for them to replicate your voice.
It honestly wasn't really that secure to begin with, since the audio would have the daylights crushed out of it through the phone system. Though AI probably makes it easier by just letting you have a computer at the end of it spit out some words.
Someone could probably get away with it by sounding vaguely enough like the person calling.
Or just do the tried and true method of going through the in-person support. Voice recognition, at least in my experience, over the phone, has trouble with accents, so someone calling to get around that isn't uncommon. It never works with me, for example, it just goes "please try again" until it redirects me to an agent.
From the Browser's viewpoint, would there be any difference if the webpage has a JS button to put something in the clipboard, or it having code running in the background that puts things into the clipboard at page load?
It's not like there's that much of a difference, as far as the Browser is concerned.
Depends on how dedicated they are. It's not implausible that some might just shuffle it away as "computer verification stuff", and faithfully paste and execute the code, since it's the computer doing a computery thing, that it says it is doing, and asks you to do, all must be well.