Skip to content

Bill Gates and Linus Torvalds meet for the first time.

Technology
44 37 234
  • 9 Stimmen
    2 Beiträge
    0 Aufrufe
    J
    Oh yeah, history has a habit of siding with tyrannical fuckwits like ALL THE TIME, you dumb fucking literal dickhead. Your head actually looks like a penis.
  • 92 Stimmen
    7 Beiträge
    0 Aufrufe
    L
    Got hit with paywall and cookies! Lol Can’t blame BBC for POTUS tariffs. Upvoted for sharing.
  • 52 Stimmen
    12 Beiträge
    5 Aufrufe
    E
    I can already speak to my cat. It's not really an enlightening conversation it's basically him demanding food, or he wants to go outside, or he wants better food than the food provided. That's basically the extent of his conversation skills. I mean he's a cat, he's not exactly going to talk about politics with me is it even if we could translate between our "languages"
  • 349 Stimmen
    72 Beiträge
    333 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • 73 Stimmen
    13 Beiträge
    58 Aufrufe
    F
    They have a tiny version that is listed as 1000 on their website, plus the simulation is FOSS
  • Iran asks its people to delete WhatsApp

    Technology technology
    25
    1
    225 Stimmen
    25 Beiträge
    122 Aufrufe
    baduhai@sopuli.xyzB
    Communicate securely with WhatsApp? That's an oxymoron.
  • 41 Stimmen
    3 Beiträge
    25 Aufrufe
    P
    Yes. I can't use lynx for most of the sites I am used to go with it. They are all protecting themselves with captcha and other form of javascript computation. The net is dying. Fucking thank you AI-bullshitery...
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.