Skip to content

Former GM Executive: BYD cars are good in terms of design, features, price, quality. If we let BYD into the U.S. market, it could end up destroying american manufacturers

Technology
357 184 2
  • 18 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • AI agents wrong ~70% of time: Carnegie Mellon study

    Technology technology
    285
    1
    967 Stimmen
    285 Beiträge
    848 Aufrufe
    D
    This is you https://youtu.be/mkcKQmr7kRc
  • This Is Why Tesla’s Robotaxi Launch Needed Human Babysitters

    Technology technology
    26
    1
    114 Stimmen
    26 Beiträge
    110 Aufrufe
    H
    Karel es hone
  • OSTP Has a Choice to Make: Science or Politics?

    Technology technology
    7
    1
    30 Stimmen
    7 Beiträge
    35 Aufrufe
    B
    Ye I expect so, I don't like the way this author just doesn't bother explaining her points. She just states that she disagrees and says they should be left to their own rules. Which is probably fine, but that's just lazy or she's not mentioning the difference for another reason
  • New Orleans debates real-time facial recognition legislation

    Technology technology
    12
    1
    150 Stimmen
    12 Beiträge
    56 Aufrufe
    A
    [image: 62e40d75-1358-46a4-a7a5-1f08c6afe4dc.jpeg] Palantir had a contract with New Orleans starting around ~2012 to create their predictive policing tech that scans surveillance cameras for very vague details and still misidentifies people. It's very similar to Lavender, the tech they use to identify members of Hamas and attack with drones. This results in misidentified targets ~10% of the time, according to the IDF (likely it's a much higher misidentification rate than 10%). Palantir picked Louisiana over somewhere like San Francisco bc they knew it would be a lot easier to violate rights and privacy here and get away with it. Whatever they decide in New Orleans on Thursday during this Council meeting that nobody cares about, will likely be the first of its kind on the books legal basis to track civilians in the U.S. and allow the federal government to take control over that ability whenever they want. This could also set a precedent for use in other states. Guess who's running the entire country right now, and just gave high ranking army contracts to Palantir employees for "no reason" while they are also receiving a multimillion dollar federal contract to create an insane database on every American and giant data centers are being built all across the country.
  • 25 Stimmen
    4 Beiträge
    24 Aufrufe
    roofuskit@lemmy.worldR
    At least the AI doesn't mean to lie to you, unlike the intention of the rest of the site.
  • 80 Stimmen
    27 Beiträge
    97 Aufrufe
    lanusensei87@lemmy.worldL
    Consider the possibility that you don't need to be doing anything wrong besides existing to be persecuted by a fascist regime.
  • 1 Stimmen
    8 Beiträge
    37 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.