Skip to content

Iran asks its people to delete WhatsApp

Technology
25 21 0
  • xAI Data Center Emits Plumes of Pollution, New Video Shows

    Technology technology
    50
    1
    516 Stimmen
    50 Beiträge
    4 Aufrufe
    G
    You do. But you also plan in the case the surrounding infrastructure fails. But more to the point, in some cases it is better to produce (parto of) your own electricity (where better means cheaper) than buy it on the market. It is not really common but is doable.
  • 122 Stimmen
    21 Beiträge
    1 Aufrufe
    T
    I thought Trump and Elon had a major falling out? Actually now that I think of it, news about that fizzled out very quickly. Did they silently kiss and make up behind closed doors or something?
  • 88 Stimmen
    21 Beiträge
    3 Aufrufe
    J
    The self hosted model has hard coded censored content.
  • WhatsApp is working on video and voice calls on the web

    Technology technology
    10
    1
    6 Stimmen
    10 Beiträge
    3 Aufrufe
    A
    Worked well for me. Although all the people I care about had already Signal, Element or Threema installed, so I am not a great pull factor. And those everyday moms from child care or from wherever can reach me via SMS, for the two messages/year.
  • 1 Stimmen
    8 Beiträge
    5 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 342 Stimmen
    43 Beiträge
    6 Aufrufe
    G
    highly recommend using containerized torrents through a VPN. I have transmission and openvpn containers. when the network goes down transmission can't connect since it's networked through the ovpn container. once the vpn is restored, everything restarts and resumes where it left off. ever since I've had this setup running, I haven't had a nastygram sent to me.
  • 142 Stimmen
    4 Beiträge
    5 Aufrufe
    P
    The topic is more nuanced, all the logs indicate email/password combos that were compromised. While it is possible this is due to a malware infection, it could be something as simple as a phishing website. In this case, credentials are entered but no "malware" was installed. The point being it doesn't look great that someone has ANY compromises... But again, anyone who's used the Internet a bit has some compromised. For example, in a password manager (especially the one on iPhone), you'll often be notified of all your potentially compromised accounts. [image: 7a5e8350-e47e-4d67-b096-e6e470ec7050.jpeg]
  • 121 Stimmen
    58 Beiträge
    10 Aufrufe
    D
    I bet every company has at least one employee with right-wing political views. Choosing a product based on some random quotes by employees is stupid.