this post was submitted on 14 May 2026
1515 points (99.3% liked)

Technology

84701 readers
3736 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Godort@lemmy.ca 84 points 2 days ago (11 children)

Jarczak’s fork crossed the line by injecting falsified identity metadata into its network communication. “In simple terms: it pretended to be the official Bambu Studio client when communicating with our servers.”

If it's easy enough to get access to your cloud infrastructure by just changing some metadata about the connection, then you really should re-think your authentication systems. If I were to publish the exact model and pinning of the lock on my house, it would be silly of me to be mad that someone used that to make their own keys.

[–] paraphrand@lemmy.world 11 points 2 days ago* (last edited 2 days ago) (2 children)

I dunno. Plenty of people have gotten in serious trouble for just accessing publicly reachable data and systems. And this was without identifying themselves as someone else or acting as someone else.

I wonder if the courts would agree with you. I don’t think “your lock was shitty” will hold up in court.

Maybe this is one of those cases where every single user of the software is liable since they are the one accessing the computer systems? But the software creator isn’t? I dunno.

This is just a comment on accessing computer systems. Not a comment on 3D printers or Louis.

[–] wintermute@discuss.tchncs.de 4 points 2 days ago* (last edited 2 days ago)

The impersonating metadata Bambu refers to is AFAIK only the User-Agent header in the request, and the forker didn’t “inject” or “falsify” anything, they just used that part of the open source code as it was provided by Bambu.

load more comments (1 replies)
load more comments (9 replies)