Skip to content

getoffpocket.com, my guide to Pocket alternatives, just got a redesign

Technology
23 10 93
  • 57 Stimmen
    3 Beiträge
    2 Aufrufe
    S
    What a piece of shit. Luckily the lady did not take her life.
  • Trump Team Has Full Meltdown Over CNN Story on ICE-Tracking App

    Technology technology
    153
    781 Stimmen
    153 Beiträge
    407 Aufrufe
    N
    Now GrapheneOS the privacy based Android OS is calling them out https://bsky.app/profile/grapheneos.org/post/3lt2prfb2vk2r He really must be thinking just about himself, and not that Apple had the info.
  • 272 Stimmen
    80 Beiträge
    273 Aufrufe
    S
    that sub seems to be fully brigaded by bots from marketing team of closed-ai and preplexity
  • You Can Choose Tools That Make You Happy

    Technology technology
    1
    1
    30 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 297 Stimmen
    24 Beiträge
    94 Aufrufe
    S
    This is not a typical home or office printer, very specialized.
  • 1 Stimmen
    8 Beiträge
    36 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • San Francisco crypto founder faked his own death

    Technology technology
    10
    1
    98 Stimmen
    10 Beiträge
    40 Aufrufe
    S
    My head canon is that Satoshi Nakamoto... ... is Hideo Kojima. Anyway, Satoshi is the pseudonym used on the original... white paper, design doc, whatever it was, for Bitcoin. There's no doubt about that, I was there back before even Mt. Gox became a bitcoin exchange, on the forums discussing it. I thought it was a neat idea, at the time... and then I realized 95% of the discussions on that forum were about 'the ethics of fully informed ponzi schemes' and such, very little devoted to actual technical development... realized this was probably a bad omen.
  • 360 Stimmen
    24 Beiträge
    92 Aufrufe
    F
    If only they didn’t fake it to get their desired result, then maybe it could have been useful. I agree that LiDAR and other technologies should be used in conjunction with regular cameras. I don’t know why anyone would be against that unless they have vested interests. For various reasons though I understand that it isn’t always possible - price being a big one.