Skip to content

You're not alone: This email from Google's Gemini team is concerning

Technology
261 166 0
  • 341 Stimmen
    8 Beiträge
    0 Aufrufe
    A
    No I don't think there really were many so your point is valid But the law works like that, things are in a grey area or in limbo until they are defined into law. That means the new law can be written to either protect consumer privacy, or make it legal to the letter to rape consumer privacy like this bill, or some weird inbetween where some shady stuff is still explicitly allowed but in general consumers are protected in specific ways from specific privacy abuses This bill being the second option is bad because typically when laws are written it then takes a loooong time to reverse them
  • Could Windows and installed apps upload all my personal files?

    Technology technology
    2
    1 Stimmen
    2 Beiträge
    0 Aufrufe
    rikudou@lemmings.worldR
    Yes, every application has access to everything. The only exception are those weird apps that use the universal framework or whatever that thing is called, those need to ask for permissions. But most of the apps on your PC have full access to everything. And Windows does collect and upload a lot of personal information and they could easily upload everything on your system. The same of course applies for the apps as well, they have access to everything except privileged folders (those usually don't contain your personal data, but system files).
  • How will the space race affect our environment? (Video 25mins)

    Technology technology
    1
    1
    17 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • Bill Atkinson, Who Made Computers Easier to Use, Is Dead at 74

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • 204 Stimmen
    6 Beiträge
    7 Aufrufe
    C
    One could say it's their fiduciary duty.
  • Meta is now a defense contractor

    Technology technology
    54
    1
    361 Stimmen
    54 Beiträge
    10 Aufrufe
    B
    Best decision ever for a company. The US gov pisses away billions of their taxpayers money and buys all the low quality crap from the MIL without questions.
  • European Open Web Index goes public in June 2025

    Technology technology
    1
    1
    13 Stimmen
    1 Beiträge
    4 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    8 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.