Skip to content

Front Brake Lights Could Drastically Diminish Road Accident Rates

Technology
336 164 2
  • 45 Stimmen
    7 Beiträge
    0 Aufrufe
    artocode404@lemmy.dbzer0.comA
    Googlebot sad when disallowed access to 18+ videos
  • Covert Web-to-App Tracking via Localhost on Android

    Technology technology
    3
    28 Stimmen
    3 Beiträge
    2 Aufrufe
    P
    That update though: "... completely removed..." I assume this is because someone at Meta realized this was a huge breach of trust, and likely quite illegal. Edit: I read somewhere that they're just being cautious about Google Play terms of service. That feels worse.
  • Copy Table in Excel and Paste as a Markdown Table

    Technology technology
    2
    1
    23 Stimmen
    2 Beiträge
    0 Aufrufe
    ptz@dubvee.orgP
    That's based on https://github.com/jonmagic/copy-excel-paste-markdown Would be awesome to see some Lemmy clients incorporate that. I've had it requested but haven't had a chance to really dig into it yet.
  • 138 Stimmen
    16 Beiträge
    0 Aufrufe
    H
    My ports are on the front of the router. No backdoors for me, checkmate Atheists.
  • New Supermaterial: As Strong As Steel And As Light As Styrofoam

    Technology technology
    21
    1
    60 Stimmen
    21 Beiträge
    2 Aufrufe
    D
    I remember an Arthur Clarke novel where a space ship needs water from the planet below. The easiest thing is to lower cables from space and then lift some ice bergs.
  • 183 Stimmen
    39 Beiträge
    0 Aufrufe
    H
    https://archive.org/details/swgrap
  • 1 Stimmen
    8 Beiträge
    3 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    4 Beiträge
    2 Aufrufe
    K
    I wish the batteries were modular/interchangeable. You could just pull into a station, remove the spent battery and replace it with a full one, the spent one can then just get recharged and stored at the station for the next user to change out. You could even bring some extra ones in the trunk for a long trip!