Skip to content

Study finds persistent spike in hate speech on X

Technology
36 29 0
  • 45 Stimmen
    9 Beiträge
    7 Aufrufe
    M
    This will be a privacy nightmare.
  • 57 Stimmen
    7 Beiträge
    5 Aufrufe
    fizz@lemmy.nzF
    This is exciting and terrifying. I am NOT looking forward to the future anymore.
  • 21 Stimmen
    5 Beiträge
    3 Aufrufe
    N
    Both waiting and not Both alive and not Both lying or not Both existing or not
  • Meta is now a defense contractor

    Technology technology
    54
    1
    361 Stimmen
    54 Beiträge
    4 Aufrufe
    B
    Best decision ever for a company. The US gov pisses away billions of their taxpayers money and buys all the low quality crap from the MIL without questions.
  • 77 Stimmen
    5 Beiträge
    5 Aufrufe
    U
    I don't see Yarvin on here... this needs expansion.
  • 48 Stimmen
    5 Beiträge
    4 Aufrufe
    L
    Arguably we should be imposing 25% DST on digital products to counter the 25% tariff on aluminium and steel and then 10% on everything else. The US started it by imposing blanket tariffs in spite of our free trade agreement.
  • 1 Stimmen
    8 Beiträge
    7 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • The Enshitification of Youtube’s Full Album Playlists

    Technology technology
    3
    1
    108 Stimmen
    3 Beiträge
    6 Aufrufe
    dual_sport_dork@lemmy.worldD
    Especially when the poster does not disclose that it's AI. The perpetual Youtube rabbit hole occasionally lands on one of these for me when I leave it unsupervised, and usually you can tell from the "cover" art. But only if you're looking at it. Because if you just leave it going in the background eventually you start to realize, "Wow, this guy really tripped over the fine line between a groove and rut." Then you click on it and look: Curses! Foiled again. And golly gee, I'm sure glad Youtube took away the option to oughtright block channels. I'm sure that's a total coincidence. W/e. I'm a have-it-on-my-hard-drive kind of bird. Yt-dlp is your friend. Just use it to nab whatever it is you actually want and let your own media player decide how to shuffle and present it. This works great for big name commercial music as well, whereupon the record labels are inevitably dumb enough to post songs and albums in their entirety right there you Youtube. Who even needs piracy sites at that rate? Yoink!