Skip to content

Founder of 23andMe buys back company out of bankruptcy auction

Technology
60 42 202
  • X CEO Linda Yaccarino is now ex-CEO

    Technology technology
    14
    1
    187 Stimmen
    14 Beiträge
    0 Aufrufe
    T
    Pronounced "not CEO"
  • 0 Stimmen
    1 Beiträge
    0 Aufrufe
    Niemand hat geantwortet
  • 131 Stimmen
    23 Beiträge
    56 Aufrufe
    S
    theoretically software support This. And it's not only due to drivers and much more due to them not having insourced software development and their outsourced developers not using Fairphones as their daily drivers.
  • 0 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • The largest cryptocurrency money-laundering ring

    Technology technology
    26
    326 Stimmen
    26 Beiträge
    105 Aufrufe
    ulrich@feddit.orgU
    It has their name and where it came from so. Yes? That's not what I asked. Are you expecting people to direct link everything even when it is already atributed? I mean is that really too much to expect of people? To simply copy the link where they found the information and post it along with where they shared it?
  • 33 Stimmen
    7 Beiträge
    28 Aufrufe
    C
    AFAIK, you have the option to enable ads on your lock screen. It's not something that's forced upon you. Last time I took a look at the functionality, they "paid" you for the ads and you got to choose which charity to support with the money.
  • 0 Stimmen
    6 Beiträge
    31 Aufrufe
    L
    Divide and conquer. Non state-actors and special interest have a far easier time attacking a hundred small entities than one big one. Because people have much less bandwidth to track all this shit than it is to spread it around. See ALEC and the strategy behind state rights. In the end this is about economic power. The only way to curb it is through a democratic government. Lemmy servers too can be bought and sold and the communities captured that grew on them.
  • 1 Stimmen
    8 Beiträge
    36 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.