Skip to content

How Do I Prepare My Phone for a Protest?

Technology
139 82 184
  • 962 Stimmen
    100 Beiträge
    45 Aufrufe
    M
    While you're right to be skeptical, if they just wanted to collect data they would have an Android version. And their stated reason for not supporting it, is that push notifications on Android would require them to at store device-IDs, which they want to avoid for privacy reasons and being vulnerable to subpoenas.
  • 129 Stimmen
    22 Beiträge
    70 Aufrufe
    N
    I can’t believe he knows anybody like that. You think you know somebody…
  • Canada Drops Digital Tax That Infuriated Trump to Restart Trade Talks

    Technology technology
    17
    80 Stimmen
    17 Beiträge
    54 Aufrufe
    R
    Jesus fuck that’s a lot of days
  • 138 Stimmen
    28 Beiträge
    36 Aufrufe
    1
    Not our. i talk, and you talk. it is our discussion. It’s a discussion you are trying to have i am not trying to have, i am having it. here you are, replying to me. why are you trying so hard to prove that a discussion is not a discussion? it does not make sense. I labeled as a layman’s guess. yeah. and since i am more knowledgeable than you in this particular regard, i contributed some information you might not have had. now you do and your future layman's guess can be more educated. that is how the discussion works. and for some strange reason, you seem to be pissed about it.
  • 1k Stimmen
    145 Beiträge
    242 Aufrufe
    P
    Not just that. The tax preparation industry has gotten tax more complex and harder to file in the US You get the government you can afford. The tax preparation industry has been able to buy several governments
  • 41 Stimmen
    5 Beiträge
    23 Aufrufe
    paraphrand@lemmy.worldP
    Network Effects.
  • 62 Stimmen
    6 Beiträge
    29 Aufrufe
    W
    What could possibly go wrong? Edit: reads like the substrate still needs to be introduced first
  • 1 Stimmen
    8 Beiträge
    31 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.