Skip to content

Sitting up and waiting.

Technology
7 6 0
  • 367 Stimmen
    27 Beiträge
    0 Aufrufe
    P
    They're like "Wahhh we need to hit 3.5% and then the fascist dictator will totally resign!" and then Trump is like "Oooo my delicate little feefees, oh well, here comes my Gestapo!" while the 50501 protest marshalls chant "We did it! We don't need crushing violence to make a change!" while completely ignoring that the NKD protests accomplished literally nothing.
  • Spyware and state abuse: The case for an EU-wide ban

    Technology technology
    2
    1
    54 Stimmen
    2 Beiträge
    1 Aufrufe
    M
    I'm surprised it isn't already illegal to install software on someone's phone without their consent or knowledge. Sounds like a form of property damage.
  • The hidden cost of Georgia’s online casino boom

    Technology technology
    1
    19 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 151 Stimmen
    23 Beiträge
    7 Aufrufe
    D
    I played around the launch and didn't realize there were bots (outside of pve)... But I also assumed I was shooting a bunch of kids that barely understood the controls.
  • 580 Stimmen
    278 Beiträge
    28 Aufrufe
    V
    The main difference being the consequences that might result from the surveillance.
  • 5 Stimmen
    2 Beiträge
    5 Aufrufe
    alphane_moon@lemmy.worldA
    I don't drive and have minimal experience with cars. Does it make a big difference whether your Android Automotive solution is based on Android 13 or 15? It's been a long time since I've cared about OS upgrades for Android on smartphones, perhaps the situation is different with Android Automotive?
  • 1 Stimmen
    8 Beiträge
    5 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • *deleted by creator*

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    2 Aufrufe
    Niemand hat geantwortet