Skip to content

Vibe coding service Replit deleted production database

Technology
104 65 0
  • 44 Stimmen
    3 Beiträge
    33 Aufrufe
    I
    Next up: Dos Exploit found in all electric devices in the world! A hacker with physical access can cut the wires.
  • 96 Stimmen
    2 Beiträge
    22 Aufrufe
    U
    Still, a 2025 University of Arizona study that interviewed farmers and government officials in Pinal County, Arizona, found that a number of them questioned agrivoltaics’ compatibility with large-scale agriculture. “I think it’s a great idea, but the only thing … it wouldn’t be cost-efficient … everything now with labor and cost of everything, fuel, tractors, it almost has to be super big … to do as much with as least amount of people as possible,” one farmer stated. Many farmers are also leery of solar, worrying that agrivoltaics could take working farmland out of use, affect their current operations or deteriorate soils. Those fears have been amplified by larger utility-scale initiatives, like Ohio’s planned Oak Run Solar Project, an 800 megawatt project that will include 300 megawatts of battery storage, 4,000 acres of crops and 1,000 grazing sheep in what will be the country’s largest agrivoltaics endeavor to date. Opponents of the project worry about its visual impacts and the potential loss of farmland.
  • AMD warns of new Meltdown, Spectre-like bugs affecting CPUs

    Technology technology
    9
    1
    198 Stimmen
    9 Beiträge
    69 Aufrufe
    anyoldname3@lemmy.worldA
    This isn't really the same kind of bug. Those bugs made instructions emit the wrong answer, which is obviously really bad, and they're really rare. The bugs in the article make instructions take different amounts of time depending on what else the CPU has done recently, which isn't something anyone would notice except that by asking the kernel to do something and measuring the time to execute affected instructions, an attacker that only had usermode access could learn secrets that should only be available to the kernel.
  • 372 Stimmen
    172 Beiträge
    1k Aufrufe
    swelter_spark@reddthat.comS
    No problem. If that doesn't work for you, ComfyUI is also a popular option, but it's more complicated.
  • 18 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • 40K IoT cameras worldwide stream secrets to anyone with a browser.

    Technology technology
    18
    1
    118 Stimmen
    18 Beiträge
    91 Aufrufe
    T
    For the Emperor!
  • 116 Stimmen
    8 Beiträge
    40 Aufrufe
    S
    Common Noyb W
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.