Skip to content

Former GM Executive: BYD cars are good in terms of design, features, price, quality. If we let BYD into the U.S. market, it could end up destroying american manufacturers

Technology
342 175 2
  • Crypto.com

    Technology technology
    4
    2
    2 Stimmen
    4 Beiträge
    29 Aufrufe
    D
    It's like complaining about the cost of Nike but still buying and wearing it.
  • Fully remote control your Nissan Leaf (or other modern cars)

    Technology technology
    27
    1
    145 Stimmen
    27 Beiträge
    117 Aufrufe
    B
    Never buy a tesla, Elon and any employee can just watch you, hell if they really wanted they could drive you into on coming traffic for the fun of it. Majority of those accidents were not.
  • 332 Stimmen
    35 Beiträge
    144 Aufrufe
    R
    We have batteries. But yeah, attacking the grid might be smart.
  • One-Click RCE in ASUS's Preinstalled Driver Software

    Technology technology
    9
    29 Stimmen
    9 Beiträge
    45 Aufrufe
    M
    Yeah, Lemmy has a VERY large Linux user base, which means Windows discussions tend to get mocked or dismissed. But the reality is that Windows is still the dominant OS for the vast majority of users, by leaps and bounds. Linux runs the world’s infrastructure, but Windows is what the average user boots up every day. “This exploit only works on the average user’s OS. And it only works if the user clicks the “yes” button to escalate permissions, which they have been conditioned to always do without question. Obviously this isn’t an exploit to worry about.”
  • 4 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    37 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 163 Stimmen
    9 Beiträge
    39 Aufrufe
    stroz@infosec.pubS
    Move fast and break people
  • 0 Stimmen
    3 Beiträge
    22 Aufrufe
    thehatfox@lemmy.worldT
    The platform owners don’t consider engagement to me be participation in meaningful discourse. Engagement to them just means staying on the platform while seeing ads. If bots keep people doing that those platforms will keep letting them in.