Skip to content

Massive internet outage reported: Google services, Cloudflare, Character.AI among dozens of services impacted

Technology
140 95 102
  • Nexus Mods to Enforce Digital ID Age Checks Under UK and EU Laws

    Technology technology
    7
    1
    35 Stimmen
    7 Beiträge
    0 Aufrufe
    P
    You are literally a nazi /s
  • 13 Stimmen
    3 Beiträge
    6 Aufrufe
    tal@lemmy.todayT
    While details of the Pentagon's plan remain secret, the White House proposal would commit $277 million in funding to kick off a new program called "pLEO SATCOM" or "MILNET." Please do not call it "MILNET". That term's already been taken. https://en.wikipedia.org/wiki/MILNET In computer networking, MILNET (fully Military Network) was the name given to the part of the ARPANET internetwork designated for unclassified United States Department of Defense traffic.[1][2]
  • French city of Lyon ditching Microsoft for FOSS

    Technology technology
    17
    1
    494 Stimmen
    17 Beiträge
    51 Aufrufe
    K
    The important thing is that the doomsday device runs Linux
  • 300 Stimmen
    71 Beiträge
    123 Aufrufe
    T
    Time to head for greener pastures.
  • 41 Stimmen
    3 Beiträge
    18 Aufrufe
    P
    Yes. I can't use lynx for most of the sites I am used to go with it. They are all protecting themselves with captcha and other form of javascript computation. The net is dying. Fucking thank you AI-bullshitery...
  • 108 Stimmen
    22 Beiträge
    65 Aufrufe
    I
    Their previous GPU used an old AMD GPU design if I recall correctly. I wonder if they have in-house stuff now.
  • 13 Stimmen
    22 Beiträge
    79 Aufrufe
    T
    You might enjoy this blog post someone linked in another thread earlier today https://www.wheresyoured.at/the-era-of-the-business-idiot/
  • 1 Stimmen
    8 Beiträge
    28 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.