Skip to content

‘FuckLAPD.com’ Lets Anyone Use Facial Recognition to Instantly Identify Cops

Technology
214 99 1.9k
  • 282 Stimmen
    27 Beiträge
    132 Aufrufe
    F
    it becomes a form of censorship when snall websites and forums shut down because they don’t have the capacity to comply. In this scenario that's not a consideration. We're talking about algorithmically-driven content, which wouldn't apply to Lemmy, Mastodon, or many mom-and-pop sized pages and forums. Those have human moderation anyway, which the big sites don't. If you're making editorial decisions by weighting algorithmically-driven content, it's not censorship to hold you accountable for the consequences of your editorial decisions. (Just as we would any major media outlet.)
  • Rediscovering Human Purpose in the Age of AI

    Technology technology
    2
    1
    3 Stimmen
    2 Beiträge
    23 Aufrufe
    capuccino@lemmy.worldC
    well, it seems that the rich will stay rich, no matter what. It's incredible that people see AI as a religion now
  • Was ist ChatGPT?

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    17 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • Stepping outside the algorithm

    Technology technology
    1
    1
    19 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • 2 Stimmen
    12 Beiträge
    64 Aufrufe
    fisch@discuss.tchncs.deF
    If I went to the USA now, they'd probably put me there after looking at my social media activity anyway
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Backblaze Drive Stats for Q1 2025

    Technology technology
    1
    1
    49 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet