Skip to content

Why your old mobile phone may be polluting Thailand

Technology
17 15 0
  • Pornhub is Back in France.

    Technology technology
    33
    1
    311 Stimmen
    33 Beiträge
    8 Aufrufe
    D
    Nordé VPN
  • 19 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • 38 Stimmen
    7 Beiträge
    11 Aufrufe
    D
    Not easy but not hard actually really simple if you had the right energy. Just ignore this so I don't scare you.
  • 93 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • Bookmark keywords, again (Firefox)

    Technology technology
    3
    4 Stimmen
    3 Beiträge
    8 Aufrufe
    bokehphilia@lemmy.mlB
    This is terrible news. I also have a keyboard-centric workflow and also make heavy use of keyword bookmarks. I too use custom bookmarklets containing JavaScript that I can invoke with a few key strokes for multiple uses including: 1: Auto-expanding all nested Reddit comments on posts with many comments on desktop. 2: Downloading videos from certain web sites. 3: Playing a play-by-forum online board game. 4: Helping expand and aid in downloading images from a certain host. 5: Sending X (Twitter) URLs in the browser bar to Nitter or TWStalker. And all these without touching the mouse! It's really disappointing to read that Firefox could be taking so much capability in the browser away.
  • Microsoft is putting AI actions into the Windows File Explorer

    Technology technology
    11
    1
    1 Stimmen
    11 Beiträge
    7 Aufrufe
    I
    Cool, so that's a specific problem with your needed use case. That's not what you said before.
  • 143 Stimmen
    30 Beiträge
    30 Aufrufe
    johnedwa@sopuli.xyzJ
    You do not need to ask for consent to use functional cookies, only for ones that are used for tracking, which is why you'll still have some cookies left afterwards and why properly coded sites don't break from the rejection. Most websites could strip out all of the 3rd party spyware and by doing so get rid of the popup entirely. They'll never do it because money, obviously, and sometimes instead cripple their site to blackmail you into accepting them.
  • 1 Stimmen
    8 Beiträge
    8 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.