Skip to content

Google Play’s latest security change may break many Android apps for some power users. The Play Integrity API uses hardware-backed signals that are trickier for rooted devices and custom ROMs to pass.

Technology
75 46 10
  • The Prime Reasons to Avoid Amazon

    Technology technology
    88
    1
    393 Stimmen
    88 Beiträge
    34 Aufrufe
    X
    Yeah, not a choice any of us who work in tech can make. But the small choices we CAN make do add up significantly.
  • 67 Stimmen
    1 Beiträge
    7 Aufrufe
    Niemand hat geantwortet
  • 93 Stimmen
    2 Beiträge
    15 Aufrufe
    S
    I wouldn't call it unprecedented, just more obvious
  • How to store data on paper?

    Technology technology
    9
    44 Stimmen
    9 Beiträge
    32 Aufrufe
    U
    This has to be a shitpost. Transportation of paper-stored data You can take the sheets with you, send them by post, or even attach them to homing pigeons
  • 56 Stimmen
    13 Beiträge
    49 Aufrufe
    P
    I tried before, but I made my life hell on earth. I only have whatsapp now because its mandatory. Since 2022, I only have lemmy, mastodon and unfortunately whatsapp as social media.
  • 358 Stimmen
    113 Beiträge
    181 Aufrufe
    S
    The problem is the cost of each. Right now material is dirt cheap and energy prices are going up. And we are not good at long term planning.
  • Is Washington state falling out of love with Tesla?

    Technology technology
    10
    1
    61 Stimmen
    10 Beiträge
    34 Aufrufe
    B
    These Tesla owners who love their cars but hate his involvement with government are a bit ridiculous because one of the biggest reasons he got in loved with shilling for the right is that the government was looking into regulations and investigations concerning how unsafe Tesla cars are.
  • 1 Stimmen
    8 Beiträge
    31 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.