Skip to content

Trump social media site brought down by Iran hackers

Technology
133 94 0
  • 0 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 4 Stimmen
    1 Beiträge
    1 Aufrufe
    Niemand hat geantwortet
  • 2 Stimmen
    1 Beiträge
    2 Aufrufe
    Niemand hat geantwortet
  • Science and Technology News and Commentary: Aardvark Daily

    Technology technology
    2
    7 Stimmen
    2 Beiträge
    2 Aufrufe
    I
    What are you on about with this? Last news post 2013?
  • Welcome to the web we lost

    Technology technology
    22
    1
    182 Stimmen
    22 Beiträge
    12 Aufrufe
    C
    Is it though? Its always far easier to be loud and obnoxious than do something constructive, even with the internet and LLMs, in fact those things are amplifiers which if anything make the attention imbalance even more drastic and unrepresentative of actual human behaviour. In the time it takes me to write this comment some troll can write a dozen hateful ones, or a bot can write a thousand. Doesn't mean humans are shitty in a 1000/1 ratio, just means shitty people can now be a thousand times louder.
  • 1 Stimmen
    8 Beiträge
    8 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • Nextcloud cries foul over Google Play Store app rejection

    Technology technology
    31
    1
    256 Stimmen
    31 Beiträge
    6 Aufrufe
    S
    I have the regular F-droid and it does automatic updates now.
  • 0 Stimmen
    8 Beiträge
    3 Aufrufe
    M
    Sure thing! So glad I could be helpful! I don't blame you. It's the only thing I'm keeping a Win10 dual-boot for right now, and to their credit, it does work quite well in Windows. We've had a ton of fun with our set. In the meantime, I'm keeping up with the project but not actively tinkering with it myself, because it's exciting but also not quite there yet. It's at least given me hope that it can be done though! I'm confident we'll see significant gains sooner rather than later. Hats off to them. (Once my income stabilizes I'll gotta pitch them some funds...) Envision has made it VERY convenient to get set up, but the whole process still saps more time than "Fire it up and play." So maybe play with it at some point, but either way definitely keep your ear to the ground. I'm hoping in the future we'll get to use it for things like Godot XR or Blender integration.