redcalcium ,

Every once in a while security researchers would discover sophisticated exploits that would allow malwares to take over your computer via multimedia files, but those are actually rarely exploited in the wild by run off the mill malwares.

Unless you're an important person being targeted by hackers and three letter agencies, your biggest source of threat is running infected programs from untrusted sources, e.g. cracks downloaded from random torrents or warez sites, shady sites serving ads that trick you to run some executables, etc.

EveryMuffinIsNowEncrypted , (edited )
@EveryMuffinIsNowEncrypted@lemmy.blahaj.zone avatar

I really hate to be "that person", but..........it's "run of the mill", not "run off the mill", friend.

It's a term from the late 1800s that refers to "manufactured goods not graded or sorted for quality—that is, a mill's products before they've been separated according to what will sell for how much." (Source for quote: https://www.merriam-webster.com/wordplay/where-does-run-of-the-mill-come-from)

Seriously, I'm not trying to be a grammar nazi here. Unless of course that was just autocorrect being a dick, in which case I'll go walk off a cliff now... :/

redcalcium ,

Thank you for the correction!

EveryMuffinIsNowEncrypted ,
@EveryMuffinIsNowEncrypted@lemmy.blahaj.zone avatar

Of course. :) I love learning about etymology and stuff, but I understand language is an evolving phenomenon so I try not to be a dick. Lol, hopefully, I succeeded.

Midnight1938 ,

I thought I was wrong about the phrase for a minute

Churbleyimyam ,

That's really interesting. Thanks :)

EveryMuffinIsNowEncrypted ,
@EveryMuffinIsNowEncrypted@lemmy.blahaj.zone avatar

Of course. :)

Rai , (edited )

Wild that people have ESCAPED VMs… but yeah that’s not happening on my boring ass’s computer

Sethayy ,

Me with SELinux hardened podman in a VM, running an offline Minecraft server😳

cor ,

theoretically… but no.

Walking_coffin ,

Like someone else said, it's unlikely. However it is possible but it would need to exploit your media player (VLC) and/or your OS. As long as your source is trustworthy you shouldn't have to worry, that's why the megathread is there.

Thebay OP ,

The mkv file wasn't form a trustworthy source.

finley ,

As others have said, it’s technically possible, but it would extremely difficult and would require coordinating a lot of different variables which is extremely unlikely. I’m not sure there’s actually ever been an example of this type of attack outside of a lab.

Imgonnatrythis ,

Your wife is not going to believe it bud.

BakedCatboy ,

I'm gonna go with unlikely.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • [email protected]
  • kbinchat
  • All magazines