Skip to content

Apple sues YouTuber who leaked iOS 26’s new “Liquid Glass” software redesign

Technology
74 50 8
  • Bluesky is rolling out age verification in the UK

    Technology technology
    40
    1
    165 Stimmen
    40 Beiträge
    297 Aufrufe
    3dcadmin@lemmy.relayeasy.com3
    you know that the new online safety act mandates age verification for pretty much anything don't you?
  • X CEO Linda Yaccarino is now ex-CEO

    Technology technology
    15
    1
    245 Stimmen
    15 Beiträge
    107 Aufrufe
    semi_hemi_demigod@lemmy.worldS
    Buffalo buffalo buffalo buffalo Buffalo buffalo buffalo
  • 0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • 285 Stimmen
    134 Beiträge
    625 Aufrufe
    I
    I'm not afraid of that at all. But if you draw shit tons of power from a crappy socket, things start to heat up real quick. Like getting really fucking hot, as in burn your house down hot.
  • For All That Is Good About Humankind, Ban Smartphones

    Technology technology
    89
    1
    132 Stimmen
    89 Beiträge
    426 Aufrufe
    D
    Appreciated, but do you think the authorities want to win the war on drugs?
  • $20 for us citizens

    Technology technology
    1
    0 Stimmen
    1 Beiträge
    13 Aufrufe
    Niemand hat geantwortet
  • 1 Stimmen
    8 Beiträge
    40 Aufrufe
    L
    I think the principle could be applied to scan outside of the machine. It is making requests to 127.0.0.1:{port} - effectively using your computer as a "server" in a sort of reverse-SSRF attack. There's no reason it can't make requests to 10.10.10.1:{port} as well. Of course you'd need to guess the netmask of the network address range first, but this isn't that hard. In fact, if you consider that at least as far as the desktop site goes, most people will be browsing the web behind a standard consumer router left on defaults where it will be the first device in the DHCP range (e.g. 192.168.0.1 or 10.10.10.1), which tends to have a web UI on the LAN interface (port 8080, 80 or 443), then you'd only realistically need to scan a few addresses to determine the network address range. If you want to keep noise even lower, using just 192.168.0.1:80 and 192.168.1.1:80 I'd wager would cover 99% of consumer routers. From there you could assume that it's a /24 netmask and scan IPs to your heart's content. You could do top 10 most common ports type scans and go in-depth on anything you get a result on. I haven't tested this, but I don't see why it wouldn't work, when I was testing 13ft.io - a self-hosted 12ft.io paywall remover, an SSRF flaw like this absolutely let you perform any network request to any LAN address in range.
  • 32 Stimmen
    8 Beiträge
    46 Aufrufe
    J
    Apparently, it was required to be allowed in that state: Reading a bit more, during the sentencing phase in that state people making victim impact statements can choose their format for expression, and it's entirely allowed to make statements about what other people would say. So the judge didn't actually have grounds to deny it. No jury during that phase, so it's just the judge listening to free form requests in both directions. It's gross, but the rules very much allow the sister to make a statement about what she believes her brother would have wanted to say, in whatever format she wanted. From: https://sh.itjust.works/comment/18471175 influence the sentence From what I've seen, to be fair, judges' decisions have varied wildly regardless, sadly, and sentences should be more standardized. I wonder what it would've been otherwise.