Skip to content

The Arc Browser Is Dead

Technology
88 53 64
  • The Really Dark Truth About Bots

    Technology technology
    4
    84 Stimmen
    4 Beiträge
    1 Aufrufe
    H
    I definately feel this way. Outside of the federation my use of the net now is just paper work, technical work, meida streaming, and video games. Which is a lot of but the fediverse goes tits up and nothing like it comes to pass my only social media involvment will be as necessary (my condo has a facebook page and job searching sites are technically [and creepily] social media but I just put in applications and don't look at the feed I don't want.)
  • 390 Stimmen
    103 Beiträge
    0 Aufrufe
    F
    The idea Biden opened the borders is thoroughly debunked Haha good one. Wait……you’re serious?
  • 327 Stimmen
    64 Beiträge
    111 Aufrufe
    B
    I get that, but it's more logical to me that of I'm going to whistleblow on a company to not use one of their devices to do it. That way it doesn't matter what apps are or are not secure, you're not using their device that can potentially track you.
  • Virtual Network Solutions in India - Expert IT Services

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    6 Aufrufe
    Niemand hat geantwortet
  • Firefox is dead to me – and I'm not the only one who is fed up

    Technology technology
    55
    1
    45 Stimmen
    55 Beiträge
    38 Aufrufe
    F
    Never had issue with Firefox in my day to day use, sites load fine, uBlock stops all the annoyances and thankfully youtube works well for me.
  • An earnest question about the AI/LLM hate

    Technology technology
    57
    73 Stimmen
    57 Beiträge
    41 Aufrufe
    ineedmana@lemmy.worldI
    It might be interesting to cross-post this question to !fuck_ai@lemmy.world but brace for impact
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    3 Beiträge
    12 Aufrufe
    thehatfox@lemmy.worldT
    The platform owners don’t consider engagement to me be participation in meaningful discourse. Engagement to them just means staying on the platform while seeing ads. If bots keep people doing that those platforms will keep letting them in.