Nope. I don’t talk about myself like that.

  • 0 Posts
  • 856 Comments
Joined 2 years ago
cake
Cake day: June 8th, 2023

help-circle

  • Saik0@lemmy.saik0.comtoLemmy Shitpost@lemmy.worldIYKYK
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 days ago

    Nope, it wasn’t… Even then though, the game is old enough that we can no longer assume that people have even played the game anymore. Kids are using the internet that would have been born after FO:NV. There are likely some 20 year olds on this site that have never played it because they would have been too young.




  • I was going to leave this alone… your original comment was correct enough that it wouldn’t matter and your “dedicated attacker” left it fine when i read it before.

    but your edit has a gaping flaw. you assume that all content in the library would be physically released. lots of shows and movies are not physically released now. Can’t claim “backup” for those. The moment a movie studio finds your stuff and can map a few titles and one of them never had a physical release… your in the shit.

    but yes you can be much harder to scan overall with a few steps. fail2ban is a great answer that makes it deeply unlikely to be an issue.

    but i wish that they’d just fix it.

    edit: OR that they wouldn’t try to go after you for distribution…


  • All of these “vulnerabilities”, require already having knowledge of the ItemIDs, and anyone without it poking around will get banned.

    Which are simply MD5 hashes… You can precompile (rainbow tables) those. The “knowledge” here to get a valid video stream is “What path is the file on” which is pretty standardized. This is a good way to have a major movie studio’s process server knocking on your door.






  • Sure. Now who here wants to litigate it and find out?

    the prosecution may have committed a crime in finding it.

    Web scanners/crawlers aren’t illegal though. And since it’s not authenticated there’s no attempt to break any security/authentication/encryption. You don’t get in trouble for finding a random URL in a google search and accessing it. You’d get in trouble if you had to bypass some security measure to get there.

    The point of this all is that these endpoints have no measure in place. Seemingly on purpose, and it’s documented by the maintainers that they don’t intend to fix it and leaving it open is intentional.

    You can gamble it. I won’t. I just can’t accept that “Jellyfin is better” that keeps getting pushed when big gaping problematic holes like this exist.



  • You’re wrong, period. Stop trying to debate laws interpretation of a country you don’t even speak the language of.

    LMFO. I actually speak English, French, Polish, and German (in proficiency order) and have an EU citizenship.

    I just happen to live in the USA. So congrats, you’re wrong again. Try not to resort to personal attacks next time. You’ll look much less silly.

    YOUR intention doesn’t matter. You don’t maintain the jellyfin code. The actual code designers specifically left the endpoints open for “compatibility”. There was a conscious decision for those endpoints to not require authorization, and worse, IT’S DOCUMENTED. This is not like the case you’re quoting. If accessing endpoints without auth was ever illegal, almost all IoT devices would be illegal, a good chunk of gaming and other services would be illegal, etc… This premise is asinine.

    You realize that google and other sites regularly scan and capture direct links to websites without ever giving a shit about a login page somewhere else on the site. You don’t see lawsuits against any of those crawlers, nor the people who click the crawled links when they return in a search result. This is the exact same premise.



  • Article 323-1 : you access my server without my authorization -> 3 years of prison, 100k€ fine

    Bullshit. Notice the term is fraudulent. They are not making a bad login or accessing anything that requires authorization. There is no requirement here that simply accesses a web page is sufficient.

    Article 323-3 : you touch my data in any way -> 5 years of prison, 150k fine

    Again FRAUDULENT. Since it’s public access, there’s nothing illegal happening here. Further any company that would be scanning for this material to build a lawsuit would have the legal right to reproduce the content (eg a law-firm that was contracted by universal, sony, etc…)

    It requires authentication or bypass of functioning code to be fraudulent. Making calls to apis that have no authentication cannot be illegal. This is literally how a good chunk of the internet itself works. If it was illegal the internet wouldn’t exist in your country.

    Edit: Just to make it clear. It’s not a “flaw”. The github link itself shows that the managers of jellyfin are aware of the problem and intentionally do not “fix” it as they want backwards compatibility.