Skip to content

PSA: Stop Using These Fire-Prone Anker Power Banks Right Now

Technology
56 43 0
  • 55 Stimmen
    17 Beiträge
    0 Aufrufe
    S
    Drawing a sexy cartoon that looks like an adult, with a caption that says "I'm 12", counts. So yeah, probably.
  • 37 Stimmen
    2 Beiträge
    4 Aufrufe
    P
    Idk if it’s content blocking on my end but I can’t tell you how upset I am that the article had no pictures of the contraption or a video of it in action.
  • 438 Stimmen
    349 Beiträge
    241 Aufrufe
    G
    This just popped up on my feed. I can show more but I'm really not feeling like it. [image: a8aea3c2-1348-43a2-b17d-365721ce1a24.jpeg]
  • Google’s test turns search results into an AI-generated podcast

    Technology technology
    4
    1
    6 Stimmen
    4 Beiträge
    10 Aufrufe
    lupusblackfur@lemmy.worldL
    Oh, Google... Just eviler and eviler every day. Not only robbing creators of any monetization via clicking on links but now just blatantly stealing their content for an even more efficient theft model. FFS. I can't fucking wait to complete my de-googling project and get you the absolute fuck completely out of my life. I've developed a hatred for Google that actually rivals my hatred for Apple. ‍️
  • 54 Stimmen
    7 Beiträge
    6 Aufrufe
    F
    After some further reading it seems obvious that the two incidents are entirely unrelated, but it was a fun rabbit hole for a sec!
  • 810 Stimmen
    152 Beiträge
    50 Aufrufe
    C
    Do you mean investors are trying to manipulate stocks by planting stories? Yeah, I think so. But intelligence agencies have whole training programs on how to manipulate narratives, and a very long track record of doing so. See: Israel's hasbara apparatus, GCHQ leaked documents on infiltrating and derailing socialist discussions, Church Committee Hearings, "The Cultural Cold War" by Frances Stonor Saunders.
  • Ai Code Commits

    Technology technology
    37
    1
    164 Stimmen
    37 Beiträge
    31 Aufrufe
    M
    From what I know, those agents can be absolutely fantastic as long as they run under strict guidance of a senior developer who really knows how to use them. Fully autonomous agents sound like a terrible idea.
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.