Skip to content

‘FuckLAPD.com’ Lets Anyone Use Facial Recognition to Instantly Identify Cops

Technology
140 87 0
  • Deep Dive on Google's TPU (Tensor Processing Unit)

    Technology technology
    1
    45 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • Trump extends TikTok ban deadline by another 90 days

    Technology technology
    6
    1
    24 Stimmen
    6 Beiträge
    4 Aufrufe
    N
    TikTacos
  • 376 Stimmen
    51 Beiträge
    5 Aufrufe
    L
    I believe that's what a write down generally reflects: The asset is now worth less than its previous book value. Resale value isn't the most accurate way to look at it, but it generally works for explaining it: If I bought a tool for 100€, I'd book it as 100€ worth of tools. If I wanted to sell it again after using it for a while, I'd get less than those 100€ back for it, so I'd write down that difference as a loss. With buying / depreciating / selling companies instead of tools, things become more complex, but the basic idea still holds: If the whole of the company's value goes down, you write down the difference too. So unless these guys bought it for five times its value, they'll have paid less for it than they originally got.
  • Diego

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • You are Already On "The List"

    Technology technology
    2
    47 Stimmen
    2 Beiträge
    5 Aufrufe
    M
    Even if they're wrong. It's too late. You're already on the list. .... The only option is to destroy the list and those who will use it
  • 456 Stimmen
    48 Beiträge
    22 Aufrufe
    L
    That's good to know, thanks.
  • Anthropic's AI is Writing Its Own Blog - Oh Wait. No It's Not

    Technology technology
    4
    67 Stimmen
    4 Beiträge
    8 Aufrufe
    mrjgyfly@lemmy.worldM
    They absolutely will. AI is great if you drastically lower your standards.
  • 1 Stimmen
    8 Beiträge
    8 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.