Skip to content

Your TV Is Spying On You

Technology
71 44 0
  • Resurrecting a dead torrent tracker and finding 3 million peers

    Technology technology
    57
    321 Stimmen
    57 Beiträge
    0 Aufrufe
    G
    [image: b2c65740-fc22-437d-a27a-22129d68f194.jpeg]
  • Matrix.org is Introducing Premium Accounts

    Technology technology
    110
    1
    226 Stimmen
    110 Beiträge
    5 Aufrufe
    F
    It's nice that this exists, but even for this I'd prefer to use an open source tool. And it of course helps with migration only if the old HS is still online.. I think most practically this migration function would be built inside some Matrix client (one that would support more than one server to start with), but I suppose a standalone tool would be a decent solution as well.
  • 80 Stimmen
    14 Beiträge
    5 Aufrufe
    A
    It was very boring.
  • Stepping outside the algorithm

    Technology technology
    1
    1
    19 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • 122 Stimmen
    23 Beiträge
    10 Aufrufe
    A
    It's one of those things where periodically someone gets sanctioned and a few others get scared and stop doing it (or tone it down) for a while. I guess SHEIN are either overdoing it or they crossed the popularity threshold where companies become more scrutinized
  • Big Tech Wants to Become Its Own Bank

    Technology technology
    33
    1
    246 Stimmen
    33 Beiträge
    4 Aufrufe
    B
    I know, I was just being snarky
  • 1 Stimmen
    8 Beiträge
    7 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 24 Stimmen
    2 Beiträge
    4 Aufrufe
    toastedravioli@midwest.socialT
    Im all for making the traditional market more efficient and transparent, if blockchain can accommodate that, so long as we can also make crypto more like the traditional market. At least in terms of criminalizing shit that would obviously be illegal to do with securities