Skip to content

Nexus Mods to Enforce Digital ID Age Checks Under UK and EU Laws

Technology
24 16 1
  • Daily Kos is moving to WordPress

    Technology technology
    2
    1
    4 Stimmen
    2 Beiträge
    0 Aufrufe
    skribe@aussie.zoneS
    Yeah, but why WordPress? The site is blocked in Singapore btw, so I can't RTFA.
  • 47 Stimmen
    13 Beiträge
    34 Aufrufe
    N
    They don't treat their people like shit, they treat them like slaves. In countries outside China at that. https://www.bbc.com/news/articles/c3v5n7w55kpo
  • 83 Stimmen
    3 Beiträge
    4 Aufrufe
    I
    Facial recognition hates jugalos and adversarial clothing patterns
  • How LLMs could be insider threats

    Technology technology
    12
    1
    105 Stimmen
    12 Beiträge
    52 Aufrufe
    patatahooligan@lemmy.worldP
    Of course they're not "three laws safe". They're black boxes that spit out text. We don't have enough understanding and control over how they work to force them to comply with the three laws of robotics, and the LLMs themselves do not have the reasoning capability or the consistency to enforce them even if we prompt them to.
  • 40K IoT cameras worldwide stream secrets to anyone with a browser.

    Technology technology
    18
    1
    119 Stimmen
    18 Beiträge
    64 Aufrufe
    T
    For the Emperor!
  • 221 Stimmen
    16 Beiträge
    60 Aufrufe
    V
    Does it mean that some people take orders from AI and don't know it's AI ?
  • Why Decentralized Social Media Matters

    Technology technology
    45
    1
    388 Stimmen
    45 Beiträge
    126 Aufrufe
    fizz@lemmy.nzF
    Yeah we're kinda doing well. Retaining 50k mau from the initial user burst is really good and Lemmy was technologically really bad at the time. Its a lot more developed today. I think next time reddit fucks uo we spike to over 100k users and steadily grow from there.
  • 1 Stimmen
    8 Beiträge
    30 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.