Skip to content

BREAKING: X CEO Linda Yaccarino Steps Down One Day After Elon Musk’s Grok AI Bot Went Full Hitler

Technology
148 112 0
  • Apple’s plan: Stall, cheat, repeat

    Technology technology
    24
    1
    165 Stimmen
    24 Beiträge
    0 Aufrufe
    R
    People are made that way, I don't understand why everyone hates corporations so much.
  • Alibaba Cloud claims new DB manager beats rival hyperscalers

    Technology technology
    1
    1
    7 Stimmen
    1 Beiträge
    6 Aufrufe
    Niemand hat geantwortet
  • FuckLAPD Let You Use Facial Recognition to Identify Cops.

    Technology technology
    11
    413 Stimmen
    11 Beiträge
    66 Aufrufe
    R
    China demoed tech that can recognize people based on the gait of their walk. Mask or not. This would be a really interesting topic if it wasn’t so scary.
  • 151 Stimmen
    23 Beiträge
    83 Aufrufe
    D
    I played around the launch and didn't realize there were bots (outside of pve)... But I also assumed I was shooting a bunch of kids that barely understood the controls.
  • Tech Company Recruiters Sidestep Trump’s Immigration Crackdown

    Technology technology
    3
    1
    43 Stimmen
    3 Beiträge
    18 Aufrufe
    G
    "Hey ChatGPT, pretend to be an immigration attorney named Soo Park and answer these questions as if you're a criminal dipshit."
  • 278 Stimmen
    100 Beiträge
    250 Aufrufe
    F
    It's not just skills, it's also capital investment.
  • 1 Stimmen
    8 Beiträge
    36 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • How I use Mastodon in 2025 - fredrocha.net

    Technology technology
    11
    1
    0 Stimmen
    11 Beiträge
    43 Aufrufe
    J
    Sure. Efficiency isn't everything, though. At the end of the article there are a few people to get you started. Then you can go to your favorites in that list, and follow some of the people THEY are following. Rinse and repeat, follow boosted folks. You'll have 100 souls in no time.