Skip to content

Websites Are Tracking You Via Browser Fingerprinting

Technology
41 31 0
  • Trump extends TikTok ban deadline by another 90 days

    Technology technology
    6
    1
    22 Stimmen
    6 Beiträge
    0 Aufrufe
    N
    TikTacos
  • 272 Stimmen
    80 Beiträge
    4 Aufrufe
    S
    that sub seems to be fully brigaded by bots from marketing team of closed-ai and preplexity
  • 463 Stimmen
    94 Beiträge
    3 Aufrufe
    L
    Make them publishers or whatever is required to have it be a legal requirement, have them ban people who share false information. The law doesn't magically make open discussions not open. By design, social media is open. If discussion from the public is closed, then it's no longer social media. ban people who share false information Banning people doesn't stop falsehoods. It's a broken solution promoting a false assurance. Authorities are still fallible & risk banning over unpopular/debatable expressions that may turn out true. There was unpopular dissent over covid lockdown policies in the US despite some dramatic differences with EU policies. Pro-palestinian protests get cracked down. Authorities are vulnerable to biases & swayed. Moreover, when people can just share their falsehoods offline, attempting to ban them online is hard to justify. If print media, through its decline, is being held legally responsible Print media is a controlled medium that controls it writers & approves everything before printing. It has a prepared, coordinated message. They can & do print books full of falsehoods if they want. Social media is open communication where anyone in the entire public can freely post anything before it is revoked. They aren't claiming to spread the truth, merely to enable communication.
  • 22 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet
  • 50 Stimmen
    15 Beiträge
    5 Aufrufe
    A
    it's an insecurity.
  • 2 Stimmen
    12 Beiträge
    4 Aufrufe
    fisch@discuss.tchncs.deF
    If I went to the USA now, they'd probably put me there after looking at my social media activity anyway
  • 1 Stimmen
    8 Beiträge
    5 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 0 Stimmen
    1 Beiträge
    3 Aufrufe
    Niemand hat geantwortet