Skip to content

Pentagon to start using Grok as part of a $200 million contract with Elon Musk's xAI

Technology
114 80 1
  • How to guide for MCP tools, resources, and prompts

    Technology technology
    1
    1
    8 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • Why your old mobile phone may be polluting Thailand

    Technology technology
    20
    1
    88 Stimmen
    20 Beiträge
    97 Aufrufe
    C
    Yeah. My old phones are in my house somewhere.
  • 120 Stimmen
    21 Beiträge
    128 Aufrufe
    T
    I thought Trump and Elon had a major falling out? Actually now that I think of it, news about that fizzled out very quickly. Did they silently kiss and make up behind closed doors or something?
  • 157 Stimmen
    12 Beiträge
    13 Aufrufe
    W
    that's not just useless defeatism, but also false. effective end to end encryption exists in multiple forms today. signal, maybe even with a custom server. matrix if the server is being ran on trusted hardware. XMPP too with the right extensions.
  • Where are all the data centres and why should you care?

    Technology technology
    5
    1
    63 Stimmen
    5 Beiträge
    35 Aufrufe
    A
    Ai says Virginia is home to the largest data center market in the world, with over 576 data centers, primarily located in Northern Virginia,
  • 465 Stimmen
    133 Beiträge
    446 Aufrufe
    B
    If an industry can't survive without resorting to copyright theft then maybe it's not a viable business. Imagine the business that could exist if only they didn't have to pay copyright holders. What makes the AI industry any different or more special?
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 163 Stimmen
    15 Beiträge
    77 Aufrufe
    L
    Online group started by a 15 year old in Texas playing Minecraft and watching extreme gore they said in this article. Were they also involved in said sexual exploiting of other kids, or was that just the spin offs that came from other people/countries? It all sounds terrible but I wonder if this was just a kid who did something for attention and then other perpetrators got involved and kept taking it further and down other rabbit holes. Definitely seems like a know what your kid is doing online scenario, but also yikes on all the 18+ members who joined and participated in such.