Skip to content

‘If I switch it off, my girlfriend might think I’m cheating’: inside the rise of couples location sharing

Technology
415 217 156
  • 259 Stimmen
    29 Beiträge
    23 Aufrufe
    P
    Don Quixote was a fool but not an asshole.
  • 10 Stimmen
    5 Beiträge
    39 Aufrufe
    I
    So, China made their own copycat RoboCup competition?
  • AI Job Fears Hit Peak Hype While Reality Lags Behind

    Technology technology
    17
    1
    74 Stimmen
    17 Beiträge
    108 Aufrufe
    D
    I'm going to say that every layoff has a cover story. The goal, reduce the workforce make/save money, is really the only justification needed. Everything else is PR, and an attempt to stay out of legal hot water.
  • How not to lose your job to AI

    Technology technology
    16
    1
    9 Stimmen
    16 Beiträge
    76 Aufrufe
    rikudou@lemmings.worldR
    A nice "trick": After 4 or so responses where you can't get anywhere, start a new chat without the wrong context. Of course refine your question with whatever you have found out in the previous chat.
  • Hacker Tactic: ESD Diodes

    Technology technology
    1
    1
    24 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • Album 'Hysteria' Out Now

    Technology technology
    1
    1
    1 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • Big Tech Wants to Become Its Own Bank

    Technology technology
    33
    1
    245 Stimmen
    33 Beiträge
    120 Aufrufe
    B
    I know, I was just being snarky
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.