this post was submitted on 07 Mar 2024
135 points (76.1% liked)

Technology

59568 readers
3916 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
 

Zhang, an electrical engineer in Boston, decided to post about trying to unlock his Justice Tech Solutions Securebook 5 on the social platform X. The thread went viral — also catching the attention of Washington corrections officials, who have used the device for college programming since 2020.

Of particular concern was an article about Zhang’s thread published on a hacker website that shared the default password for the underlying software that starts the laptop’s operating system, presenting what the Department of Corrections considered a security concern.

The department then announced Thursday, five days after Zhang’s viral post, that it would collect all secure laptops from incarcerated students statewide “to provide an immediate system update.” By Saturday, corrections staff had collected around 1,200 laptops, spokesperson Chris Wright said in an email.

Wright confirmed no one incarcerated in Washington prisons had attempted to unlock their devices but said the decision was “made out of an abundance of caution.” It wasn’t immediately clear whether other states whose corrections departments use Securebook 5 laptops have also pulled the devices.

Archived at https://ghostarchive.org/archive/LS3co

e; updated the title due to popular demand

you are viewing a single comment's thread
view the rest of the comments
[–] LazaroFilm@lemmy.world -3 points 8 months ago (1 children)

Having root access to that computer means they can do a lot of throngs they aren’t supposed to. I fail to see this as anything but a security breach for this.

[–] pupbiru@aussie.zone 3 points 8 months ago (1 children)

i’d say that it’s a security vulnerability, but breach implies it’s been used

[–] LazaroFilm@lemmy.world 1 points 8 months ago

I see. That makes sense.