Skip to content

Apple’s Craig Federighi on the long road to the iPad’s Mac-like multitasking

Technology
35 13 104
  • Judge backs AI firm over use of copyrighted books

    Technology technology
    59
    1
    174 Stimmen
    59 Beiträge
    149 Aufrufe
    artisian@lemmy.worldA
    The students read Tolkien, then invent their own settings. The judge thinks this is similar to how claude works. I, nor I suspect the judge, meant that the students were reusing world building whole cloth.
  • How the Rubin Observatory Will Reinvent Astronomy

    Technology technology
    2
    1
    53 Stimmen
    2 Beiträge
    15 Aufrufe
    M
    Giant twice-reflecting mirror of low-expansion borrosilicate covered in pure silver and a giant digital camera with filters.
  • 216 Stimmen
    13 Beiträge
    35 Aufrufe
    J
    It’s DEI’s fault!
  • 1 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 191 Stimmen
    26 Beiträge
    78 Aufrufe
    A
    I wish everyone could read your comment right now. Spot on
  • 347 Stimmen
    51 Beiträge
    90 Aufrufe
    4
    Interestingly it loads today. I have AdAway on my phone and PiHole in my home network
  • 5 Stimmen
    10 Beiträge
    34 Aufrufe
    S
    You could look into automatic local caching for diles you're planning to seed, and stick that on an SSD. That way you don't hammer the HDDs in the NAS and still get the good feels of seeding. Then automatically delete files once they get to a certain seed rate or something and you're golden. How aggressive you go with this depends on your actual use case. Are you actually editing raw footage over the network while multiple other clients are streaming other stuff? Or are you just interested in having it be capable? What's the budget? But that sounds complicated. I'd personally rather just DIY it, that way you can put an SSD in there for cache and you get most of the benefits with a lot less cost, and you should be able to respond to issues with minimal changes (i.e. add more RAM or another caching drive).
  • 1 Stimmen
    8 Beiträge
    28 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.