Skip to content

Google Play’s latest security change may break many Android apps for some power users. The Play Integrity API uses hardware-backed signals that are trickier for rooted devices and custom ROMs to pass.

Technology
75 46 10
  • 7 Stimmen
    5 Beiträge
    0 Aufrufe
    I
    So, China made their own copycat RoboCup competition?
  • Get Your Filthy ChatGPT Away From My Liberal Arts

    Technology technology
    11
    1
    125 Stimmen
    11 Beiträge
    0 Aufrufe
    A
    It's amazing how bad the quality of the writing is, for an article that's complaining about ChatGPT.
  • 131 Stimmen
    23 Beiträge
    31 Aufrufe
    S
    theoretically software support This. And it's not only due to drivers and much more due to them not having insourced software development and their outsourced developers not using Fairphones as their daily drivers.
  • 139 Stimmen
    28 Beiträge
    120 Aufrufe
    D
    Lmao it hasn't even been a year under Trump. Calm your titties
  • 15 Stimmen
    1 Beiträge
    9 Aufrufe
    Niemand hat geantwortet
  • The weaponization of Waymo

    Technology technology
    26
    1
    148 Stimmen
    26 Beiträge
    47 Aufrufe
    F
    Not a warzone. A protest. A protest where over twice as many reporters have been assaulted and/or shot than waymo cars have burned.
  • Stack overflow is almost dead

    Technology technology
    5
    0 Stimmen
    5 Beiträge
    26 Aufrufe
    ineedmana@lemmy.worldI
    students When I was a student I despised the idea of typeless var in C#. Then a few years later at my day job I fully embraced C++ auto. I understand the frustration but unfortunately being wrong is part of learning
  • 1 Stimmen
    8 Beiträge
    31 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.