Telegram Web Link
Forwarded from &'a ::rynco::UntitledChannel (didi)
T-60s
&'a ::rynco::UntitledChannel
T-60s
飞辣
Forwarded from 科技圈🎗在花频道📮
TikTok首席执行官周受资计划出席特朗普就职典礼

据两名知情人士透露,TikTok首席执行官周受资计划出席美国当选总统特朗普的就职典礼,他受邀坐在讲台上的荣誉席位上,前总统、家人和其他重要嘉宾传统上都坐在这个位置上。

《纽约时报》引述知情人士说,特朗普就职委员会已向周受资发出邀请,出席下星期一(1月20日)的就职典礼。不愿透露姓名的官员星期三(15日)说,周受资将与扎克伯格和马斯克等科技大亨一起出席此次活动,贝佐斯亦受邀。

联合早报

📮投稿 ☘️频道 🌸聊天
【中国移动APP更新提醒】尊敬的客户您好,若您的中国移动APP存在闪退情况,请您先“卸载”中国移动APP,然后点击 https://dx.10086.cn/A/7DcNCQ 下载最新版本APP(若无闪退情况请忽略)。春节将至,中国移动APP新春福利活动等您参与!心级服务,让爱连接。【中国移动】
#sms

---
发生什么了
😁3
Forwarded from 每日消费电子观察 (无羽の翼 (「 • ̀ω•́ )「)
知情人士称拜登政府正考虑让 TikTok 在美国继续运营
https://cctv.com/~
https://www.nbcnews.com/~

太阳打西边出来了?🤔
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 心惊报 (投稿机器人)
今日苏州机场笑话

via 匿名
😁10
Forwarded from bupt.moe
#security #alipay
今天14:40~14:45 支付宝疑似出现重大失误,错误地把政府补贴适用给所有支付。
评论区甚至有个人转账命中。
https://www.v2ex.com/t/1105618
🤯6🥰3😱1
Forwarded from 竹新社
韩国总统尹锡悦的法律代理人团16日向首尔中央地方检察厅检举公调处处长吴东运和警察厅国家搜查本部长禹钟寿涉嫌发动内乱。
代理人团主张,上述二人收集属于军事机密的总统官邸设施和防御设施情报,了解将其拆除的方法,并尝试调动3700余名警员侵入官邸,违反《刑事诉讼法》第110条和111条侵入军事设施拘留总统。
代理人团表示,该行为属于内乱罪。在此过程中,公调处和国家搜查本部还犯下诸多罪行,如妨害特殊公务执行、滥用职权妨碍权利行使、违反《军事机密保护法》等。
韩联社
🤡6👍1
#Forgejo v10.0 was just released! Get it at https://forgejo.org/download/. 🚀

TOTP secrets were made more secure. The UI was made more accessible and reworked to improve the UX. Searching users, repositories, releases and issues was improved. Low German (Plattdüütsch) translation was completed. This is the last version to allow a transparent upgrade from Gitea v1.22 or lower.

Read more at https://forgejo.org/2025-01-release-v10-0/

https://floss.social/@forgejo/113837365333810504
👍1
evilsocket:
121 days ago I reported something to Apple, no fixes and no follow ups after my ping yesterday, so here it goes the full disclosure.

Apple CUPS does not verify TLS allowing an attacker on the same network to impersonate any previously used IPPS printer (or any device really) via spoofed Bonjour advertisements and therefore forcing the Bonjour discovery service to (automatically and silently) connect to an arbitrary host (also external to LAN), leaking sensitive information and allowing the attacker to interact with a plethora of other system services in nasty ways. Of course this also allows anyone to intercept, read and modify print jobs on the network, but frankly that is the least impactful attack vector here. https://github.com/apple/cups/blob/master/cups/tls-darwin.c#L1278s

If you use openssl to check your printer TLS certificate on port 631, you'll probably find that the device is using a self-signed certificate, like pretty much all printers I had a chance to test. I have no idea how they're going to fix this without breaking backwards compatibility. I know they want to switch to a Trust On First Use approach, but that's vulnerable as well due to other conditions. This set of vulnerabilities can be easily leveraged by using the ZeroGod bettercap module I've pushed months ago -> https://github.com/bettercap/bettercap/tree/master/modules/zerogod

https://x.com/evilsocket/status/1879846515180511705
2025/07/14 20:15:24
Back to Top
HTML Embed Code: