Skip to content

BREAKING: X CEO Linda Yaccarino Steps Down One Day After Elon Musk’s Grok AI Bot Went Full Hitler

Technology
188 138 0
  • I made a porn scroller without the clutter

    Technology technology
    1
    1
    4 Stimmen
    1 Beiträge
    14 Aufrufe
    Niemand hat geantwortet
  • 238 Stimmen
    20 Beiträge
    70 Aufrufe
    A
    Unless you are a major corporation... you are not free to take anything.
  • 0 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • 68 Stimmen
    17 Beiträge
    73 Aufrufe
    H
    Set up arrs, you basically set it and forget it.
  • matrix is cooked

    Technology technology
    75
    1
    180 Stimmen
    75 Beiträge
    256 Aufrufe
    penguin202124@sh.itjust.worksP
    That's very fair. Better start contributing I guess.
  • 197 Stimmen
    21 Beiträge
    86 Aufrufe
    S
    Sure: for professionals. However when casually commenting in a forum it is fine because the reader can go check the citations (and perhaps come back and add to the thread).
  • 40 Stimmen
    10 Beiträge
    43 Aufrufe
    T
    Clearly the author doesn't understand how capitalism works. If Apple can pick you up by the neck, turn you upside down, and shake whatever extra money it can from you then it absolutely will do so. The problem is that one indie developer doesn't have any power over Apple... so they can go fuck themselves. The developer is granted the opportunity to grovel at the feet of their betters (richers) and pray that they are allowed to keep enough of their own crop to survive the winter. If they don't survive... then some other dev will probably jump at the chance to take part in the "free market" and demonstrate their worth.
  • 1 Stimmen
    8 Beiträge
    37 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.