Skip to content

NVIDIA is full of shit

Technology
115 53 167
  • 567 Stimmen
    127 Beiträge
    25 Aufrufe
    T
    They also bundle twice as much crapware
  • 73 Stimmen
    15 Beiträge
    17 Aufrufe
    L
    same, i however dont subscribe to thier "contact you by recruiters, since you get flooded with indian recruiters of questionable positions, and jobs im not eligible for. unfortunately for the field i was trying to get into, wasnt helping so i found just a regular job in the mean time.
  • You're not alone: This email from Google's Gemini team is concerning

    Technology technology
    298
    1
    838 Stimmen
    298 Beiträge
    514 Aufrufe
    M
    My understanding is that, in broad strokes... Aurora acts like a proxy or mirror that doesn't require you to sign in to get Google Play Store apps. It doesn't provide any other software besides what you specifically download from it, and it doesn't include any telemetry/tracking like normal Google Play Store would. microG is a reimplementation of Google Play services (the suite of proprietary background services that Google runs on normal Android phones). MicroG doesn't have the bloat and tracking and other closed source functionality, but rather acts as a stand-in that other apps can talk to (when they'd normally be talking to Google Play services). This has to be installed and configured and I would refer to the microG github or other documentation. GrapheneOS has its own sandboxed Google Play Services which is basically unmodified Google Play Services, crammed into its own sandbox with no special permissions, and a compatibility layer that retains some functionality while keeping it from being able to access app data with high level permissions like it would normally do on a vanilla Android phone.
  • Musk's X sues New York state over social media hate speech law

    Technology technology
    1
    1
    0 Stimmen
    1 Beiträge
    10 Aufrufe
    Niemand hat geantwortet
  • 238 Stimmen
    54 Beiträge
    36 Aufrufe
    P
    I was so confused when I saw your comment until I reread my own. It really is top notch technology I guess!
  • 48 Stimmen
    19 Beiträge
    71 Aufrufe
    mrjgyfly@lemmy.worldM
    Does that run the risk of leading to a future collapse of certain businesses, especially if their expenses remain consistently astronomical like OpenAI? Please note I don’t actually know—not trying to be cheeky with this question. Genuinely curious.
  • 1 Stimmen
    8 Beiträge
    32 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 12 Stimmen
    3 Beiträge
    18 Aufrufe
    F
    The new Pebble watches look interesting. Relatively basic, but long battery life (they promise) and open-source operating system.