Skip to content

Samsung phones can survive twice as many charges as Pixel and iPhone, according to EU data

Technology
95 68 0
  • Google kills the fact-checking snippet

    Technology technology
    13
    149 Stimmen
    13 Beiträge
    37 Aufrufe
    L
    Remember when that useless bot was around here, objectively wrong, and getting downvoted all the time? Good times.
  • The Problem with AI War Games

    Technology technology
    2
    1
    21 Stimmen
    2 Beiträge
    13 Aufrufe
    P
    Shall we play a game?
  • 139 Stimmen
    28 Beiträge
    110 Aufrufe
    D
    Lmao it hasn't even been a year under Trump. Calm your titties
  • Microsoft’s new genAI model to power agents in Windows 11

    Technology technology
    12
    1
    31 Stimmen
    12 Beiträge
    44 Aufrufe
    ulrich@feddit.orgU
    which one would sell more I mean they would charge a lot of money for the stripped down one because it doesn't allow them to monetize it on the back end, and the vast majority would continue using the resource-slurping ad-riddled one.
  • 51 Stimmen
    2 Beiträge
    15 Aufrufe
    baronvonj@lemmy.worldB
    So glad I never got on WhatsApp
  • Matrix.org is Introducing Premium Accounts

    Technology technology
    110
    1
    225 Stimmen
    110 Beiträge
    78 Aufrufe
    F
    It's nice that this exists, but even for this I'd prefer to use an open source tool. And it of course helps with migration only if the old HS is still online.. I think most practically this migration function would be built inside some Matrix client (one that would support more than one server to start with), but I suppose a standalone tool would be a decent solution as well.
  • 54 Stimmen
    7 Beiträge
    6 Aufrufe
    F
    After some further reading it seems obvious that the two incidents are entirely unrelated, but it was a fun rabbit hole for a sec!
  • 1 Stimmen
    8 Beiträge
    24 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.