Skip to content

Linus Torvalds and Bill Gates Meet for the First Time Ever

Technology
224 110 1.0k
  • Meta Takes Hard Line Against Europe's AI Rules

    Technology technology
    19
    1
    89 Stimmen
    19 Beiträge
    0 Aufrufe
    F
    One part of this is jurisdiction. I'm being very simplistic here and only have a vague sense of the picture, really (my own prejudice - I find just about everything about meta abhorrent) They are based in a country that's solely oritentated towards liberty - not fairness or common sense. There are other parts, of course, like lobbying, tax breaks and so on, but a big part is because they're not based in the EU.
  • (LLM) A language model built for the public good

    Technology technology
    18
    1
    131 Stimmen
    18 Beiträge
    145 Aufrufe
    D
    Is the red cross involved? Because if not, using a red cross in the article is misleading and potentially a crime.
  • 179 Stimmen
    12 Beiträge
    83 Aufrufe
    N
    Remember curse voice ? I remember
  • Most Common PIN Codes

    Technology technology
    50
    1
    182 Stimmen
    50 Beiträge
    318 Aufrufe
    E
    Came here for this comment. Did not disappoint!
  • 41 Stimmen
    3 Beiträge
    27 Aufrufe
    M
    Does anybody know of a resource that's compiled known to be affected system or motherboard models using this specific BMC? Eclypsium said the line of vulnerable AMI MegaRAC devices uses an interface known as Redfish. Server makers known to use these products include AMD, Ampere Computing, ASRock, ARM, Fujitsu, Gigabyte, Huawei, Nvidia, Supermicro, and Qualcomm. Some, but not all, of these vendors have released patches for their wares.
  • 781 Stimmen
    144 Beiträge
    531 Aufrufe
    D
    They can be LED I just want the aesthetic.
  • Tiny LEDs May Power Future AI Inteconnects

    Technology technology
    1
    1
    8 Stimmen
    1 Beiträge
    14 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.