Skip to content

More than $35 million has been stolen from over 150 victims since December — ‘nearly every victim’ was a LastPass user

Technology
2 2 0
  • EV tax credits might end even sooner than House bill proposed

    Technology technology
    7
    49 Stimmen
    7 Beiträge
    7 Aufrufe
    B
    It's not just tax credits for new cars, they are also getting rid of the Used EV Tax Credit which has helped to keep the prices of used EVs (relatively) lower.
  • 111 Stimmen
    24 Beiträge
    20 Aufrufe
    O
    Ingesting all the artwork you ever created by obtaining it illegally and feeding it into my plagarism remix machine is theft of your work, because I did not pay for it. Separately, keeping a copy of this work so I can do this repeatedly is also stealing your work. The judge ruled the first was okay but the second was not because the first is "transformative", which sadly means to me that the judge despite best efforts does not understand how a weighted matrix of tokens works and that while they may have some prevention steps in place now, early models showed the tech for what it was as it regurgitated text with only minor differences in word choice here and there. Current models have layers on top to try and prevent this user input, but escaping those safeguards is common, and it's also only masking the fact that the entire model is built off of the theft of other's work.
  • 0 Stimmen
    1 Beiträge
    5 Aufrufe
    Niemand hat geantwortet
  • Stepping outside the algorithm

    Technology technology
    1
    1
    19 Stimmen
    1 Beiträge
    5 Aufrufe
    Niemand hat geantwortet
  • 99 Stimmen
    48 Beiträge
    28 Aufrufe
    Y
    enable the absolute worst of what humanity has to offer. can we call it a reality check? we think of humans as so great and important and unique for quite a while now while the world is spiraling downwards. maybe humans arent so great after all. like what is art? ppl vibe with slob music but birds cant vote. how does that make sense? if one can watch AI slob (and we all will with the constant improvements in ai) and like it, well maybe our taste of art is not any better than what a bird can do and like. i hope LLM will lead to a breakthrough in understanding what type of animal we really are.
  • Big Tech Wants to Become Its Own Bank

    Technology technology
    33
    1
    245 Stimmen
    33 Beiträge
    30 Aufrufe
    B
    I know, I was just being snarky
  • 82 Stimmen
    3 Beiträge
    11 Aufrufe
    sfxrlz@lemmy.dbzer0.comS
    As a Star Wars yellowtext: „In the final days of the senate, senator organa…“
  • 1 Stimmen
    8 Beiträge
    15 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.