Skip to content

Streaming overtakes cable and broadcast as the most-watched form of TV

Technology
17 14 59
  • 106 Stimmen
    28 Beiträge
    6 Aufrufe
    S
    Sure, there will be gaps. But asking the government to fill the roll of a patent results in a massive privacy breach. The juice is not worth the squeeze.
  • 229 Stimmen
    47 Beiträge
    125 Aufrufe
    D
    Oh it's Towers of Hanoi. I have a screensaver that does this.
  • 349 Stimmen
    72 Beiträge
    141 Aufrufe
    M
    Sure, the internet is more practical, and the odds of being caught in the time required to execute a decent strike plan, even one as vague as: "we're going to Amerika and we're going to hit 50 high profile targets on July 4th, one in every state" (Dear NSA analyst, this is entirely hypothetical) so your agents spread to the field and start assessing from the ground the highest impact targets attainable with their resources, extensive back and forth from the field to central command daily for 90 days of prep, but it's being carried out on 270 different active social media channels as innocuous looking photo exchanges with 540 pre-arranged algorithms hiding the messages in the noise of the image bits. Chances of security agencies picking this up from the communication itself? About 100x less than them noticing 50 teams of activists deployed to 50 states at roughly the same time, even if they never communicate anything. HF (more often called shortwave) is well suited for the numbers game. A deep cover agent lying in wait, potentially for years. Only "tell" is their odd habit of listening to the radio most nights. All they're waiting for is a binary message: if you hear the sequence 3 17 22 you are to make contact for further instructions. That message may come at any time, or may not come for a decade. These days, you would make your contact for further instructions via internet, and sure, it would be more practical to hide the "make contact" signal in the internet too, but shortwave is a longstanding tech with known operating parameters.
  • Fake It Till You Make It? Builder.ai’s $1.5B AI Scam Exposed

    Technology technology
    14
    1
    70 Stimmen
    14 Beiträge
    44 Aufrufe
    W
    Religion and fiat are always at the top
  • 846 Stimmen
    133 Beiträge
    171 Aufrufe
    A
    reminds me of the time when something with Amazon was Indian employees
  • 77 Stimmen
    22 Beiträge
    86 Aufrufe
    F
    https://web.archive.org/web/20250526132003/https://www.yahoo.com/news/cias-communications-suffered-catastrophic-compromise-started-iran-090018710.html?ref=404media.co
  • Revolutionary cooling technology emerges from Slovenia

    Technology technology
    8
    43 Stimmen
    8 Beiträge
    35 Aufrufe
    S
    You know what's even cheaper to run than this "new technology"? Breathy promotion pieces that give no evidence whatsoever to support it's claims. Way to go, PR folks.
  • 1 Stimmen
    8 Beiträge
    34 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.