{"id":21026160,"date":"2022-08-09T22:50:00","date_gmt":"2022-08-09T20:50:00","guid":{"rendered":"https:\/\/geek.hr\/?p=21026160"},"modified":"2022-08-09T23:50:13","modified_gmt":"2022-08-09T21:50:13","slug":"muke-po-pin-ovima-pametnih-telefona","status":"publish","type":"post","link":"https:\/\/geek.hr\/clanak\/muke-po-pin-ovima-pametnih-telefona\/","title":{"rendered":"Muke po PIN-ovima pametnih telefona"},"content":{"rendered":"\n

Ako je va\u0161 PIN na pametnom telefonu 1234 ili 0000 onda imate \u010dast na\u0107i se u posebnom dru\u0161tvu<\/strong>. Onom koje koristi dvije naj\u010de\u0161\u0107e kombinacije znamenki za PIN na svijetu.<\/p>\n\n\n\n

Naime, izvr\u0161na direktorica za cyber sigurnost u Splunku, Tarah Wheeler, jednom je prilikom planet obavijestila o posebnoj listi. Listi naj\u010de\u0161\u0107ih PIN-ova na mobilnim ure\u0111ajima. <\/p>\n\n\n\n

20 “sretnih” kombinacija su redom: 1234, 1111, 0000, 1212, 7777, 1004, 2000, 4444, 2222, 6969, 9999, 3333, 5555, 6666, 1122, 1313, 8888, 4321, 2001 i 1010. Wheeler je napomenula i da \u010dak 26% pametnih mobitela ima navedene PIN kombinacije te da ih je mogu\u0107e otklju\u010dati. Dobro je za znati. A sad na ne\u0161to “vedrije” teme. <\/p>\n\n\n\n

\"\"
Foto: Pixabay<\/figcaption><\/figure><\/div>\n\n\n\n

Otkriveno je da hakeri mogu probiti va\u0161 PIN prislu\u0161kuju\u0107i zvu\u010dne valove koje radite dok tipkate PIN po zaslonu mobitela.<\/strong><\/p>\n\n\n\n

Naime, u objavljenom \u010dlanku Sveu\u010dili\u0161ta Cornell<\/a> opisana je nova tehnika hakiranja lozinke pametnog telefona. Oslanja se na strojno u\u010denje i mikrofon ure\u0111aja, a mo\u017ee to\u010dno pogoditi vi\u0161e od polovice \u010detveroznamenkastih PIN brojki kori\u0161tenih na ure\u0111ajima operativnog sustava Android<\/strong>. <\/p>\n\n\n\n

Doti\u010dni zlonamjerni softver<\/a> mo\u017ee biti dizajniran da zlorabi mikrofone u pametnim telefonima i sli\u010dnim ure\u0111ajima kako bi otkrio lozinke njihovih vlasnika. <\/p>\n","protected":false},"excerpt":{"rendered":"

Pogledajte \u0161to je otkriveno…<\/p>\n","protected":false},"author":3909,"featured_media":21046455,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"publish_to_discourse":"","publish_post_category":"","wpdc_auto_publish_overridden":"","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"","discourse_permalink":"","wpdc_publishing_response":"","wpdc_publishing_error":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[1],"tags":[3383,3320,3319,4160],"modified_by":"Matea P.","_links":{"self":[{"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/posts\/21026160"}],"collection":[{"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/users\/3909"}],"replies":[{"embeddable":true,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/comments?post=21026160"}],"version-history":[{"count":2,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/posts\/21026160\/revisions"}],"predecessor-version":[{"id":21046456,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/posts\/21026160\/revisions\/21046456"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/media\/21046455"}],"wp:attachment":[{"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/media?parent=21026160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/categories?post=21026160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geek.hr\/wp-json\/wp\/v2\/tags?post=21026160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}