moira

joined 1 year ago
[–] [email protected] 2 points 3 months ago

It doesn't matter that website loads javascript code for logged in user, as you need a token (which server will give you after a successful login) to authenticate to apis, it is pretty common to do that way

There wasn't a client side API, but the API was missing crucial validation of user input (eg only checking the mac address but didn't check who is actually authenticated)

 

This article is a great example why you should use your own router instead of ISP provided one

[–] [email protected] 1 points 4 months ago

thankfully that is a special mailbox for spam, I sometimes like to come through the emails and see where they submit the data, and maybe submit some data on my own, plus report the issue to website owner/hosting

[–] [email protected] 6 points 4 months ago* (last edited 4 months ago) (6 children)

At my instance I did setup a email wildcard (receive emails from any address on that domain which don't already have a account) and I get a lot of phishing and scam emails, most of them are send "to" /c/[email protected], as link to this community is linked in sidebar, but I also seen emails "send to" random usernames

screenshot showing email mailbox, about 15 phishing emails

So yeah, It is happening, i wonder how bad it is on larger instances

[–] [email protected] 1 points 5 months ago (2 children)

you can play on multiplayer just fine, as long as server have enabled offline-mode

[–] [email protected] 1 points 5 months ago (4 children)

For minecraft you can just use a offline mode in pretty much every 3rd party launcher, like SKLauncher

[–] [email protected] 3 points 8 months ago

i miss old plex (~2016), when it was actually focused on providing local content, good thing jellyfin exist

[–] [email protected] 70 points 1 year ago* (last edited 1 year ago) (4 children)

I doubt it was a real wallet - most likely it was just a scam exchange that would prompt you to send cryptocurrency "for verification" before you could try to withdraw them.
The idea was already exploited on prnt.sc, where it is possible to try bruteforce screenshot ID and find other users public screenshots - https://splashdot.github.io/scam1/