Skip to content

Operation Narnia: Iran’s nuclear scientists reportedly killed simultaneously using special weapon

Technology
387 177 1
  • 308 Stimmen
    23 Beiträge
    14 Aufrufe
    G
    I spent way too long researching the morning. That industry implies a much greater population that is attracted to children. Things get more nuanced. People are attracted to different stages, like prebubesant, early adolescence, and mid to late adolescence. It seems like an important distinction because this is a common mental disorder. I was ready to write this comment about my fear that there's a bunch of evil pedophiles living among us who are simply deterred by legal or social pressures. It seems more like the extreme stigma of pedophilia has prevented individuals from seeking assistance and has resulted in more child sexual abuse. This sort of disorder can be caused by experiencing this abuse at a younger age. When I was religious, we worked closely with an organization to help victims of trafficking. We had their stories. They entered our lives. I took care of some of these kids. As a victim of sexual abuse when I was kid, I had a hatred for these kinds of people. I feel like my brain is melting seeing how there is a high chance of people in my life being attracted to children. This isn't really to justify the industry. I'm just realizing that general harassing people openly about it might not be helping the situation.
  • Building a slow web

    Technology technology
    37
    1
    175 Stimmen
    37 Beiträge
    20 Aufrufe
    I
    Realistically, you don't need security, NAT alone is enough since the packets have nowhere to go without port forwarding. But IF you really want to build front end security here is my plan. ISP bridge -> WAN port of openwrt capable router with DSA supported switch (that is almost all of them) Set all ports of the switch to VLAN mirroring mode bridge WAN and LAN sides Fail2Ban IP block list in the bridge LAN PORT 1 toward -> OpenWRT running inside Proxmox LXC (NAT lives here) -> top of rack switch LAN PORT 2 toward -> Snort IDS LAN PORT 3 toward -> combined honeypot and traffic analyzer Port 2&3 detect malicious internet hosts and add them to the block list (and then multiple other openwrt LXCs running many many VPN ports as alternative gateways, I switch LAN host's internet address by changing their default gateway) I run no internal VLAN, all one LAN because convenience is more important than security in my case.
  • 85K – A Melhor Opção para Quem Busca Diversão e Recompensas

    Technology technology
    1
    1
    1 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • lemm.ee is shutting down at the end of this month

    Technology technology
    130
    626 Stimmen
    130 Beiträge
    40 Aufrufe
    vopyr@lemmy.worldV
    If I know correctly, it is not possible to export posts, comments, replies.
  • 374 Stimmen
    69 Beiträge
    13 Aufrufe
    T
    In those situations I usually enable 1.5x.
  • 1 Stimmen
    8 Beiträge
    8 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 12 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • 14 Stimmen
    2 Beiträge
    5 Aufrufe
    D
    "Extra Verification steps" I know how large social media companies operate. This is all about increasing the value of Reddit users to advertisers. The goal is to have a more accurate user database to sell them. Zuckerberg literally brags to corporations about how good their data is on users: https://www.facebook.com/business/ads/performance-marketing Here, Zuckerberg tells corporations that Instagram can easily manipulate users into purchasing shit: https://www.facebook.com/business/instagram/instagram-reels Always be wary of anything available for free. There are some quality exceptions (CBC, VLC, The Guardian, Linux, PBS, Wikipedia, Lemmy, ProPublica) but, by and large, "free" means they don't care about you. You are just a commodity that they sell. Facebook, Google, X, Reddit, Instagram... Their goal is keep people hooked to their smartphone by giving them regular small dopamine hits (likes, upvotes) followed by a small breaks with outrageous content/emotional content. Keep them hooked, gather their data, and sell them ads. The people who know that best are former top executives : https://www.theguardian.com/technology/2017/oct/05/smartphone-addiction-silicon-valley-dystopia https://www.nytimes.com/2019/03/01/business/addictive-technology.html https://www.today.com/parents/teens/facebook-whistleblower-frances-haugen-rcna15256