Skip to content

Supreme Court to decide whether ISPs must disconnect users accused of piracy

Technology
176 129 2
  • Telegram, the FSB, and the Man in the Middle

    Technology technology
    8
    1
    52 Stimmen
    8 Beiträge
    4 Aufrufe
    R
    You can be seen from a kilometer away, pots ))
  • Palantir partners to develop AI software for nuclear construction

    Technology technology
    4
    33 Stimmen
    4 Beiträge
    11 Aufrufe
    T
    The grift goes nuclear. No surprise.
  • 1 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • 66 Stimmen
    8 Beiträge
    8 Aufrufe
    erasmus@lemmy.worldE
    The Convergiance is beginning. Altman Be Praised!!
  • 40 Stimmen
    10 Beiträge
    15 Aufrufe
    T
    Clearly the author doesn't understand how capitalism works. If Apple can pick you up by the neck, turn you upside down, and shake whatever extra money it can from you then it absolutely will do so. The problem is that one indie developer doesn't have any power over Apple... so they can go fuck themselves. The developer is granted the opportunity to grovel at the feet of their betters (richers) and pray that they are allowed to keep enough of their own crop to survive the winter. If they don't survive... then some other dev will probably jump at the chance to take part in the "free market" and demonstrate their worth.
  • 479 Stimmen
    81 Beiträge
    47 Aufrufe
    douglasg14b@lemmy.worldD
    Did I say that it did? No? Then why the rhetorical question for something that I never stated? Now that we're past that, I'm not sure if I think it's okay, but I at least recognize that it's normalized within society. And has been for like 70+ years now. The problem happens with how the data is used, and particularly abused. If you walk into my store, you expect that I am monitoring you. You expect that you are on camera and that your shopping patterns, like all foot traffic, are probably being analyzed and aggregated. What you buy is tracked, at least in aggregate, by default really, that's just volume tracking and prediction. Suffice to say that broad customer behavior analysis has been a thing for a couple generations now, at least. When you go to a website, why would you think that it is not keeping track of where you go and what you click on in the same manner? Now that I've stated that I do want to say that the real problems that we experience come in with how this data is misused out of what it's scope should be. And that we should have strong regulatory agencies forcing compliance of how this data is used and enforcing the right to privacy for people that want it removed.
  • U.S.-Sanctioned Terrorists Enjoy Premium Boost on X

    Technology technology
    5
    1
    90 Stimmen
    5 Beiträge
    9 Aufrufe
    M
    Yeah but considering who's in charge of the government, half of us will be hit with that designation sooner or later.
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.