Skip to content

Trump Mobile launches $47 service and a gold phone

Technology
129 103 395
  • Grok, Elon Musk's AI chatbot, seems to get right-wing update

    Technology technology
    13
    1
    182 Stimmen
    13 Beiträge
    27 Aufrufe
    A
    Yep. Pretty sure that was deliberate on Musk's (or his cronies) part. Imagine working at X and being told by your boss "I'd like you to make the bot more racist please." "Can you convince it that conspiracy theories are real?"
  • 67 Stimmen
    1 Beiträge
    11 Aufrufe
    Niemand hat geantwortet
  • Trump extends TikTok ban deadline by another 90 days

    Technology technology
    6
    1
    24 Stimmen
    6 Beiträge
    29 Aufrufe
    N
    TikTacos
  • Founder of 23andMe buys back company out of bankruptcy auction

    Technology technology
    60
    1
    348 Stimmen
    60 Beiträge
    207 Aufrufe
    A
    Come on up to Canada, we still got that garlic bomb. I can still taste the one from last week
  • How Social Media Brings Out the Worst in Us

    Technology technology
    14
    1
    120 Stimmen
    14 Beiträge
    58 Aufrufe
    sturgist@lemmy.caS
    Suffering from asthma? 9/10 Doctors recommend menthol cigarettes! Peppermint fresh puts the pep in your step!
  • Palantir Revisited: Who’s Us in Us vs. Them? | naked capitalism

    Technology technology
    1
    1
    15 Stimmen
    1 Beiträge
    12 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    37 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • How I use Mastodon in 2025 - fredrocha.net

    Technology technology
    11
    1
    0 Stimmen
    11 Beiträge
    44 Aufrufe
    J
    Sure. Efficiency isn't everything, though. At the end of the article there are a few people to get you started. Then you can go to your favorites in that list, and follow some of the people THEY are following. Rinse and repeat, follow boosted folks. You'll have 100 souls in no time.