this post was submitted on 18 Jun 2025
220 points (99.5% liked)

Technology

71558 readers
4471 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 35 comments
sorted by: hot top controversial new old
[–] Alphane_Moon@lemmy.world 76 points 13 hours ago (1 children)

Funny how the author immediately decided to shut everything down when he realized the number of peer/torrents still sending requests to the domain.

[–] evidences@lemmy.world 67 points 12 hours ago (3 children)

Orphaned domains like this are interesting, there was a defcon talk, I think, where the presenter bought a bunch of blacklisted orphaned domains just to see if anything would try and connect to them. They got hit with so many botnet clients trying to phone home.

[–] Maestro@fedia.io 30 points 10 hours ago

Orphaned IPs as well. If you have an IPv4 from your cloud provider and you want to retire it, you should thoroughly scrub your DNS and all other configs before doing so. Otherwise it's trivial for someone else to spin up a machine on that IP address and abuse your domain.

[–] MysteriousSophon21@lemmy.world 25 points 8 hours ago

Yeah those orphaned domains are a goldmine for security researchers, there was a similar talk at blackhat where they showed how expired domains from major companies still recieved auth tokens and sensitive data for months after expiry.

[–] LettyWhiterock@lemmy.world 6 points 4 hours ago

Please post a link if you're able, that sounds like a very interesting watch.

[–] subignition@fedia.io 27 points 11 hours ago (1 children)
[–] Imgonnatrythis@sh.itjust.works 13 points 8 hours ago (2 children)
[–] Laser@feddit.org 55 points 8 hours ago

Because necromancy is a forbidden art

[–] jayandp@sh.itjust.works 8 points 3 hours ago

From a security standpoint, it means tons of people are requesting unencrypted info from random domains that are possibly no longer controlled by the original owners.

This is just random speculation on possibilities, but somebody could maybe figure out the IP of a suspected pirate for example, setup a dummy tracker, wait for that IP to show up, and then compare any requested hashes against a database of known torrents. How legal and useful in court this could be would depend on the country, but it is a weak point.

At the other end of the spectrum, somebody might find some kind of security vulnerability in a popular client's tracker interface, and exploit that for malware purposes by setting up a fake tracker, but that's a bit more of a stretch.

[–] cupcakezealot@piefed.blahaj.zone 12 points 10 hours ago* (last edited 10 hours ago) (1 children)

well pls resurrect the struck by lightning torrent because its taking forever to download :(

[–] Zos_Kia@lemmynsfw.com 13 points 10 hours ago (1 children)

If you have access to real debrid, sometimes they have insanely old torrents in cache. I've resurrected quite a few decades old bangers from the pirate bay that way.

[–] Appoxo@lemmy.dbzer0.com 4 points 5 hours ago (1 children)

And if there is. Please seed that.

[–] Zos_Kia@lemmynsfw.com 1 points 1 hour ago

I usually do, but in general they're dead for lack of demand

[–] ipitco@lemmy.super.ynh.fr 6 points 10 hours ago

That's the kind of thing that would be cool to do actually, but I'm not server savy enough to make a server that won't die easily under attacks