Skip to content

Microsoft Used China-Based Support for Multiple U.S. Agencies, Potentially Exposing Sensitive Data

Technology
10 8 0
  • Microsoft C++ static analysis tool bolsters warning suppressions

    Technology technology
    1
    1
    17 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 250 Stimmen
    11 Beiträge
    95 Aufrufe
    rivalarrival@lemmy.todayR
    https://en.m.wikipedia.org/wiki/Oskar_Schindler
  • Daily Kos is moving to WordPress

    Technology technology
    2
    1
    5 Stimmen
    2 Beiträge
    27 Aufrufe
    skribe@aussie.zoneS
    Yeah, but why WordPress? The site is blocked in Singapore btw, so I can't RTFA.
  • 40K IoT cameras worldwide stream secrets to anyone with a browser.

    Technology technology
    18
    1
    118 Stimmen
    18 Beiträge
    91 Aufrufe
    T
    For the Emperor!
  • 502 Stimmen
    133 Beiträge
    625 Aufrufe
    J
    Headlines have length constraints
  • 386 Stimmen
    9 Beiträge
    37 Aufrufe
    C
    Melon Usk doomed their FSD efforts from the start with his dunning-kruger-brain take of "humans drive just using their eyes, so cars shouldn't need any sensors besides cameras." Considering how many excellent engineers there are (or were, at least) at his companies, it's kind of fascinating how "stupid at the top" is just as bad, if not worse, than "stupid all the way down."
  • 462 Stimmen
    94 Beiträge
    421 Aufrufe
    L
    Make them publishers or whatever is required to have it be a legal requirement, have them ban people who share false information. The law doesn't magically make open discussions not open. By design, social media is open. If discussion from the public is closed, then it's no longer social media. ban people who share false information Banning people doesn't stop falsehoods. It's a broken solution promoting a false assurance. Authorities are still fallible & risk banning over unpopular/debatable expressions that may turn out true. There was unpopular dissent over covid lockdown policies in the US despite some dramatic differences with EU policies. Pro-palestinian protests get cracked down. Authorities are vulnerable to biases & swayed. Moreover, when people can just share their falsehoods offline, attempting to ban them online is hard to justify. If print media, through its decline, is being held legally responsible Print media is a controlled medium that controls it writers & approves everything before printing. It has a prepared, coordinated message. They can & do print books full of falsehoods if they want. Social media is open communication where anyone in the entire public can freely post anything before it is revoked. They aren't claiming to spread the truth, merely to enable communication.
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.