Skip to content

LOL GitHub [2018]

Technology
21 15 0
  • Coding and Gaming on AR Glasses

    Technology technology
    8
    34 Stimmen
    8 Beiträge
    55 Aufrufe
    shatur@lemmy.mlS
    I think the glasses are quite solid, but I haven’t dropped them yet I never buy additional warranties.
  • China's Robotaxi Companies Are Racing Ahead of Tesla

    Technology technology
    38
    1
    178 Stimmen
    38 Beiträge
    787 Aufrufe
    I
    It could. Imagine 80% autonomous vehicle traffic, 30% of that is multipassenger capable taxi service. Autonomous vehicle lanes moving reliably at 75mph. With this amount of taxi service the advantages of personal vehicle ownership falls and the wait time for an available pickup diminishes rapidly. China has many areas with pretty good public transportation. In the US, tech advances and legislation changes to enable the above model is better suited to the existing infrastructure.
  • An AI video ad is making a splash. Is it the future of advertising?

    Technology technology
    2
    10 Stimmen
    2 Beiträge
    31 Aufrufe
    apfelwoischoppen@lemmy.worldA
    Gobble that AI slop NPR. Reads like sponsored content.
  • 1 Stimmen
    1 Beiträge
    17 Aufrufe
    Niemand hat geantwortet
  • Diego

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    16 Aufrufe
    Niemand hat geantwortet
  • The AI girlfriend guy - The Paranoia Of The AI Era

    Technology technology
    1
    1
    6 Stimmen
    1 Beiträge
    19 Aufrufe
    Niemand hat geantwortet
  • 80 Stimmen
    27 Beiträge
    202 Aufrufe
    lanusensei87@lemmy.worldL
    Consider the possibility that you don't need to be doing anything wrong besides existing to be persecuted by a fascist regime.
  • 1 Stimmen
    8 Beiträge
    79 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.