• Godort@lemmy.ca
    link
    fedilink
    English
    arrow-up
    61
    ·
    13 hours ago

    Jarczak’s fork crossed the line by injecting falsified identity metadata into its network communication. “In simple terms: it pretended to be the official Bambu Studio client when communicating with our servers.”

    If it’s easy enough to get access to your cloud infrastructure by just changing some metadata about the connection, then you really should re-think your authentication systems. If I were to publish the exact model and pinning of the lock on my house, it would be silly of me to be mad that someone used that to make their own keys.

    • 4am@lemmy.zip
      link
      fedilink
      English
      arrow-up
      22
      ·
      10 hours ago

      The DMCA is literally written in a way that they could write “DO NOT USE” in a text file and include it with firmware and claim that using the firmware Ina way they didn’t like was “breaking a digital lock”

      Honestly I’m perfectly fine with the DMCA just being entirely revoked at this point. It has enabled more bad than it has done good, even when things went “right”

      • henfredemars@lemdro.id
        link
        fedilink
        English
        arrow-up
        2
        ·
        7 hours ago

        There are even supposed to be safe harbor protections, but the reality is that individuals don’t have the legal resources for it to matter.

      • xthexder@l.sw0.com
        link
        fedilink
        English
        arrow-up
        17
        ·
        edit-2
        11 hours ago

        They’re claiming that forking their open source code and using the user agent in it unchanged is “impersonation”. And the only reason that might be an issue is because Section 1201 of the DMCA makes it illegal to break any digital lock, even if it’s a shitty one. Whether this even counts as a lock is up for debate in my opinion, but that doesn’t stop people from getting sued and owing lawyers money.

        • masterofn001@lemmy.ca
          link
          fedilink
          English
          arrow-up
          11
          ·
          9 hours ago

          If you share the lock and the key with the public and tell them (via AGPL copyleft open source license) they may use, share, modify it (or not), etc with no penalty, and they even give you the secret knock, i can’t in any way see how that’s breaking a lock.

          • Bazoogle@lemmy.world
            link
            fedilink
            English
            arrow-up
            3
            ·
            7 hours ago

            But they said don’t use the key or the secret knock, otherwise they’ll write a blog shit talking you.

    • paraphrand@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      13 hours ago

      I dunno. Plenty of people have gotten in serious trouble for just accessing publicly reachable data and systems. And this was without identifying themselves as someone else or acting as someone else.

      I wonder if the courts would agree with you. I don’t think “your lock was shitty” will hold up in court.

      This is just a comment on accessing computer systems. Not a comment on 3D printers or Louis.

      • wintermute@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        35 minutes ago

        The impersonating metadata Bambu refers to is AFAIK only the User-Agent header in the request, and the forker didn’t “inject” or “falsify” anything, they just used that part of the open source code as it was provided by Bambu.

      • Deacon@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        ·
        11 hours ago

        I’ve just been listening to the Origin of Consciousness in the Breakdown of The Bicameral mind and your username is a word I had to learn in the process.