this post was submitted on 18 Jun 2025
230 points (99.6% liked)

Technology

71585 readers
3605 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 37 comments
sorted by: hot top controversial new old
[–] Alphane_Moon@lemmy.world 78 points 12 hours ago (1 children)

Funny how the author immediately decided to shut everything down when he realized the number of peer/torrents still sending requests to the domain.

[–] evidences@lemmy.world 69 points 11 hours ago (3 children)

Orphaned domains like this are interesting, there was a defcon talk, I think, where the presenter bought a bunch of blacklisted orphaned domains just to see if anything would try and connect to them. They got hit with so many botnet clients trying to phone home.

[–] LettyWhiterock@lemmy.world 5 points 3 hours ago

Please post a link if you're able, that sounds like a very interesting watch.

[–] MysteriousSophon21@lemmy.world 25 points 8 hours ago

Yeah those orphaned domains are a goldmine for security researchers, there was a similar talk at blackhat where they showed how expired domains from major companies still recieved auth tokens and sensitive data for months after expiry.

[–] Maestro@fedia.io 30 points 9 hours ago

Orphaned IPs as well. If you have an IPv4 from your cloud provider and you want to retire it, you should thoroughly scrub your DNS and all other configs before doing so. Otherwise it's trivial for someone else to spin up a machine on that IP address and abuse your domain.

[–] subignition@fedia.io 29 points 10 hours ago (1 children)
[–] Imgonnatrythis@sh.itjust.works 14 points 8 hours ago (2 children)
[–] jayandp@sh.itjust.works 8 points 2 hours ago

From a security standpoint, it means tons of people are requesting unencrypted info from random domains that are possibly no longer controlled by the original owners.

This is just random speculation on possibilities, but somebody could maybe figure out the IP of a suspected pirate for example, setup a dummy tracker, wait for that IP to show up, and then compare any requested hashes against a database of known torrents. How legal and useful in court this could be would depend on the country, but it is a weak point.

At the other end of the spectrum, somebody might find some kind of security vulnerability in a popular client's tracker interface, and exploit that for malware purposes by setting up a fake tracker, but that's a bit more of a stretch.

[–] Laser@feddit.org 57 points 7 hours ago

Because necromancy is a forbidden art

[–] cupcakezealot@piefed.blahaj.zone 12 points 9 hours ago* (last edited 9 hours ago) (1 children)

well pls resurrect the struck by lightning torrent because its taking forever to download :(

[–] Zos_Kia@lemmynsfw.com 13 points 9 hours ago (1 children)

If you have access to real debrid, sometimes they have insanely old torrents in cache. I've resurrected quite a few decades old bangers from the pirate bay that way.

[–] Appoxo@lemmy.dbzer0.com 4 points 4 hours ago (1 children)

And if there is. Please seed that.

[–] Zos_Kia@lemmynsfw.com 1 points 1 hour ago

I usually do, but in general they're dead for lack of demand

[–] ipitco@lemmy.super.ynh.fr 6 points 10 hours ago

That's the kind of thing that would be cool to do actually, but I'm not server savy enough to make a server that won't die easily under attacks