• About TC
  • Affiliate Disclaimer
  • Privacy Policy
  • TOS
  • Contact
Thursday, August 28, 2025
Techcratic
No Result
View All Result
  • AI
    Artificial Intelligence

    7 Python Built-ins That Seem Like a Joke (Until You Use Them)

    Artificial Intelligence

    Learn Python (+ AI) and Become a Certified Data Analyst for FREE This Week

    Artificial Intelligence

    From JSON to Dashboard: Visualizing DuckDB Queries in Streamlit with Plotly

    Artificial Intelligence

    The “Super Weight:” How Even a Single Parameter can Determine a Large Language Model’s…

    Artificial Intelligence

    10 Python One-Liners to Optimize Your Machine Learning Pipelines

    Artificial Intelligence

    Streamline employee training with an intelligent chatbot powered by Amazon Q Business

    Artificial Intelligence

    Writing Your First GPU Kernel in Python with Numba and CUDA

    Artificial Intelligence

    Build a scalable containerized web application on AWS using the MERN stack with Amazon Q…

    Artificial Intelligence

    Introducing Amazon Bedrock AgentCore Identity: Securing agentic AI at scale

  • Apple
    7 reasons why I dropped Netflix for Apple TV+

    7 reasons why I dropped Netflix for Apple TV+

    Make iPhone backups as easy as scrolling on TikTok

    This app lets you control every file, app, and message across all your iOS devices

    The Apple Watch is not actually carbon neutral, says German court

    The Apple Watch is not actually carbon neutral, says German court

    Netflix confirms it didn’t mean to support that Apple TV feature everyone has wanted for years

    Netflix’s new all-time top movie hit at the perfect time for Apple TV+

    Apple just got partial App Store vindication from a very unlikely source

    Apple just got partial App Store vindication from a very unlikely source

    DMCC: Apple suggests UK users may see slower feature rollouts

    DMCC: Apple suggests UK users may see slower feature rollouts

    Colombia probes Apple over App Store antitrust concerns

    Colombia probes Apple over App Store antitrust concerns

    How to make clear iPhone app icons with iOS 26

    How to make clear iPhone app icons with iOS 26

    iTorrent app unavailable at AltStore PAL

    iTorrent app unavailable at AltStore PAL

  • ComputerWorld
    New procedural memory framework promises cheaper, more resilient AI agents

    New procedural memory framework promises cheaper, more resilient AI agents

    AI PCs to surge, claiming over half the market by 2026

    AI PCs to surge, claiming over half the market by 2026

    Anthropic invites enterprises to test letting Claude operate Chrome browser

    Anthropic invites enterprises to test letting Claude operate Chrome browser

    LLMs easily exploited using run-on sentences, bad grammar, image scaling

    LLMs easily exploited using run-on sentences, bad grammar, image scaling

    Dropbox to offer its genAI service Dash for download

    Dropbox to offer its genAI service Dash for download

    Intel warns US govt equity stake could disrupt its global business and strategic deals

    Intel warns US govt equity stake could disrupt its global business and strategic deals

    US threat of sanctions on EU officials over tech law raises risks for enterprises

    US threat of sanctions on EU officials over tech law raises risks for enterprises

    As US takes 10% stake in Intel, new questions arise for enterprise buyers

    As US takes 10% stake in Intel, new questions arise for enterprise buyers

    AI bigwigs bow to US gov’t demands on pricing, but could see long-term benefits

    AI bigwigs bow to US gov’t demands on pricing, but could see long-term benefits

  • Gaming
    REDRAGON S101 GAMING KEYBOARD

    Xbox Insiders Can Stream and Play in New Ways with Xbox Game Pass Starting Today

    Why This Trailer Changed Five Nights At Freddys Forever

    Why This Trailer Changed Five Nights At Freddys Forever

    A PR storm has erupted around Razer’s gaming laptops with reports of faulty trackpads and keyboards, glitchy software, performance issues and poor customer support

    A PR storm has erupted around Razer’s gaming laptops with reports of faulty trackpads and keyboards, glitchy software, performance issues and poor customer support

    Raya Lucaria Academy in 17 minutes (walkthrough) #eldenring #walkthrough #gaming

    Raya Lucaria Academy in 17 minutes (walkthrough) #eldenring #walkthrough #gaming

    All Grow a Garden codes and how to redeem them

    All Grow a Garden codes and how to redeem them

    Become an UNSTOPPABLE Nightfarer | Routing Strategies For ANY Run | Elden Ring

    Become an UNSTOPPABLE Nightfarer | Routing Strategies For ANY Run | Elden Ring

    Top 3 Broken And Op Wylder Builds in Elden Ring Nightreign

    Top 3 Broken And Op Wylder Builds in Elden Ring Nightreign

    Isso vai mudar o mundo do RPG | React Dungeons & Dragons: Honra entre rebeldes

    Isso vai mudar o mundo do RPG | React Dungeons & Dragons: Honra entre rebeldes

    Taobab Lynels 02 The Legend Of Zelda Breath Of The Wild Walkthrough Nintendo Switch

    Taobab Lynels 02 The Legend Of Zelda Breath Of The Wild Walkthrough Nintendo Switch

  • Retro Rewind
    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

  • Tech Art
    Augmented Reality with Aruco Markers: Bridging the Digital and Physical Worlds

    Augmented Reality with Aruco Markers: Bridging the Digital and Physical Worlds

    This took me 2 hours | Speed painting my logo | Digital painting | illustration

    This took me 2 hours | Speed painting my logo | Digital painting | illustration

    Virtual Makeup Design: Volume 1 with Neville Page

    Virtual Makeup Design: Volume 1 with Neville Page

    Perfectionism (ranting while drawing pixel art wallpapers)

    Perfectionism (ranting while drawing pixel art wallpapers)

    Africa Wants a More Accurate World Map

    Africa Wants a More Accurate World Map

    TUTORIAL MENGGAMBAR DIGITAL DI APLIKASI SKETCHBOOK!!

    TUTORIAL MENGGAMBAR DIGITAL DI APLIKASI SKETCHBOOK!!

    Pennsylvania Museum Sues Trump Administration Over Grant Cuts

    Pennsylvania Museum Sues Trump Administration Over Grant Cuts

    AK Interactive Terrains Asphalt (AK8013) – HO Scale Model Railroading

    AK Interactive Terrains Asphalt (AK8013) – HO Scale Model Railroading

    Pixel Art Tutorial – Character Sprite (32×32)

    Pixel Art Tutorial – Character Sprite (32×32)

  • Tech Deals
    7 Inch Plastic Traffic Cones Sport Training Agility Marker Cone for Soccer, Skating,…

    7 Inch Plastic Traffic Cones Sport Training Agility Marker Cone for Soccer, Skating,…

    Scrabble – Nintendo DS

    Scrabble – Nintendo DS

    Pendragon Studios: The Thing: Norwegian Outpost – Expansion to The Thing: Board Game,…

    Pendragon Studios: The Thing: Norwegian Outpost – Expansion to The Thing: Board Game,…

    Replacement Voice Remote Control for Insignia, Toshiba, Amazon Fire Smart TV

    Replacement Voice Remote Control for Insignia, Toshiba, Amazon Fire Smart TV

    StarTech.com USB 3.0 to Dual HDMI Adapter, USB to 2x HDMI Monitor Converter for Windows,…

    StarTech.com USB 3.0 to Dual HDMI Adapter, USB to 2x HDMI Monitor Converter for Windows,…

    SABRENT [3-Pack 22AWG Premium 6ft USB-C to USB A 3.0 Sync and Charge Cables [Black]…

    SABRENT [3-Pack 22AWG Premium 6ft USB-C to USB A 3.0 Sync and Charge Cables [Black]…

    KingSpec Z5 1TB External SSD – 2100MB/s, Portable Solid State Hard Drives with RGB…

    KingSpec Z5 1TB External SSD – 2100MB/s, Portable Solid State Hard Drives with RGB…

    intel Core i7-4770 Quad-Core Desktop Processor 3.4 GHZ LGA 1150 8 MB Cache BX80646I74770…

    intel Core i7-4770 Quad-Core Desktop Processor 3.4 GHZ LGA 1150 8 MB Cache BX80646I74770…

    Sata HDD & SSD Hot Swap Cage, 6 Bay Hard Drive Dock for 5.25” Enclosure, 6 Bay Hard…

    Sata HDD & SSD Hot Swap Cage, 6 Bay Hard Drive Dock for 5.25” Enclosure, 6 Bay Hard…

  • Techs Got To Eat
    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

  • Tesla
    For Tesla Cybertruck 2PCS Door Built-in Hidden Storage Organizer, Full Surround Design…

    For Tesla Cybertruck 2PCS Door Built-in Hidden Storage Organizer, Full Surround Design…

    Elon Musk is lying about Tesla’s self-driving and I have the DMs to prove it

    Elon Musk is lying about Tesla’s self-driving and I have the DMs to prove it

    Rear View Mirror Protector Frame, Interior Rear View Mirror Cover for Model 3 Y X S Semi…

    Rear View Mirror Protector Frame, Interior Rear View Mirror Cover for Model 3 Y X S Semi…

    Under Screen Storage Organizer Compatible with Tesla Model Y Juniper 2026-2025/Model 3…

    Under Screen Storage Organizer Compatible with Tesla Model Y Juniper 2026-2025/Model 3…

    Nycetek USB Hub for Tesla Model 3/Y, 45W PD Center Console Retractable Fast Charging,…

    Nycetek USB Hub for Tesla Model 3/Y, 45W PD Center Console Retractable Fast Charging,…

    MASHA Dashboard Cover for Tesla Model 3/Y, Flannel Dashboard Pad Dash Mat Compatible…

    MASHA Dashboard Cover for Tesla Model 3/Y, Flannel Dashboard Pad Dash Mat Compatible…

    J1772 to Tesla Charging Adapter 60 Amp / 250V AC Compatible with SAE J1772 EV Charger…

    J1772 to Tesla Charging Adapter 60 Amp / 250V AC Compatible with SAE J1772 EV Charger…

    Pickup Truck Cover Waterproof All Weather, Outdoor Indoor Truck Protection Cover for…

    Pickup Truck Cover Waterproof All Weather, Outdoor Indoor Truck Protection Cover for…

    Car LED Hood Light,Waterproof LED Light Strips Cool Monochromatic Car LED Light for CCar…

    Car LED Hood Light,Waterproof LED Light Strips Cool Monochromatic Car LED Light for CCar…

  • UFO
    Shocking Discoveries Voyager Made at the Edge of the Solar System

    Shocking Discoveries Voyager Made at the Edge of the Solar System

    FOCO Men’s NFL Team Logo Casual Hat Caps

    FOCO Men’s NFL Team Logo Casual Hat Caps

    New Era NFL Men’s Stated Short Sleeve Performance T-Shirt

    New Era NFL Men’s Stated Short Sleeve Performance T-Shirt

    Reddit’s Darkest Conspiracy Theories

    Reddit’s Darkest Conspiracy Theories

    QWinOut F550 Air Frame 550mm Wheelbase Drone Frame Kit for KK MK MWC DIY MultiCopter Hexacopter UFO Helicopter

    QWinOut F550 Air Frame 550mm Wheelbase Drone Frame Kit for KK MK MWC DIY MultiCopter Hexacopter UFO Helicopter

    Report to headquarters! Unidentified flying object detected!#owl #burrowingowl

    Report to headquarters! Unidentified flying object detected!#owl #burrowingowl

    Sky Viper Vista HD Video Drone

    Sky Viper Vista HD Video Drone

    Old Soviet spacecraft expected to hit Earth

    Old Soviet spacecraft expected to hit Earth

    Roswell, NM Tourism | Funny Alien Extraterrestrial UFO Saucer Men Women T-Shirt

    Roswell, NM Tourism | Funny Alien Extraterrestrial UFO Saucer Men Women T-Shirt

  • AI
    Artificial Intelligence

    7 Python Built-ins That Seem Like a Joke (Until You Use Them)

    Artificial Intelligence

    Learn Python (+ AI) and Become a Certified Data Analyst for FREE This Week

    Artificial Intelligence

    From JSON to Dashboard: Visualizing DuckDB Queries in Streamlit with Plotly

    Artificial Intelligence

    The “Super Weight:” How Even a Single Parameter can Determine a Large Language Model’s…

    Artificial Intelligence

    10 Python One-Liners to Optimize Your Machine Learning Pipelines

    Artificial Intelligence

    Streamline employee training with an intelligent chatbot powered by Amazon Q Business

    Artificial Intelligence

    Writing Your First GPU Kernel in Python with Numba and CUDA

    Artificial Intelligence

    Build a scalable containerized web application on AWS using the MERN stack with Amazon Q…

    Artificial Intelligence

    Introducing Amazon Bedrock AgentCore Identity: Securing agentic AI at scale

  • Apple
    7 reasons why I dropped Netflix for Apple TV+

    7 reasons why I dropped Netflix for Apple TV+

    Make iPhone backups as easy as scrolling on TikTok

    This app lets you control every file, app, and message across all your iOS devices

    The Apple Watch is not actually carbon neutral, says German court

    The Apple Watch is not actually carbon neutral, says German court

    Netflix confirms it didn’t mean to support that Apple TV feature everyone has wanted for years

    Netflix’s new all-time top movie hit at the perfect time for Apple TV+

    Apple just got partial App Store vindication from a very unlikely source

    Apple just got partial App Store vindication from a very unlikely source

    DMCC: Apple suggests UK users may see slower feature rollouts

    DMCC: Apple suggests UK users may see slower feature rollouts

    Colombia probes Apple over App Store antitrust concerns

    Colombia probes Apple over App Store antitrust concerns

    How to make clear iPhone app icons with iOS 26

    How to make clear iPhone app icons with iOS 26

    iTorrent app unavailable at AltStore PAL

    iTorrent app unavailable at AltStore PAL

  • ComputerWorld
    New procedural memory framework promises cheaper, more resilient AI agents

    New procedural memory framework promises cheaper, more resilient AI agents

    AI PCs to surge, claiming over half the market by 2026

    AI PCs to surge, claiming over half the market by 2026

    Anthropic invites enterprises to test letting Claude operate Chrome browser

    Anthropic invites enterprises to test letting Claude operate Chrome browser

    LLMs easily exploited using run-on sentences, bad grammar, image scaling

    LLMs easily exploited using run-on sentences, bad grammar, image scaling

    Dropbox to offer its genAI service Dash for download

    Dropbox to offer its genAI service Dash for download

    Intel warns US govt equity stake could disrupt its global business and strategic deals

    Intel warns US govt equity stake could disrupt its global business and strategic deals

    US threat of sanctions on EU officials over tech law raises risks for enterprises

    US threat of sanctions on EU officials over tech law raises risks for enterprises

    As US takes 10% stake in Intel, new questions arise for enterprise buyers

    As US takes 10% stake in Intel, new questions arise for enterprise buyers

    AI bigwigs bow to US gov’t demands on pricing, but could see long-term benefits

    AI bigwigs bow to US gov’t demands on pricing, but could see long-term benefits

  • Gaming
    REDRAGON S101 GAMING KEYBOARD

    Xbox Insiders Can Stream and Play in New Ways with Xbox Game Pass Starting Today

    Why This Trailer Changed Five Nights At Freddys Forever

    Why This Trailer Changed Five Nights At Freddys Forever

    A PR storm has erupted around Razer’s gaming laptops with reports of faulty trackpads and keyboards, glitchy software, performance issues and poor customer support

    A PR storm has erupted around Razer’s gaming laptops with reports of faulty trackpads and keyboards, glitchy software, performance issues and poor customer support

    Raya Lucaria Academy in 17 minutes (walkthrough) #eldenring #walkthrough #gaming

    Raya Lucaria Academy in 17 minutes (walkthrough) #eldenring #walkthrough #gaming

    All Grow a Garden codes and how to redeem them

    All Grow a Garden codes and how to redeem them

    Become an UNSTOPPABLE Nightfarer | Routing Strategies For ANY Run | Elden Ring

    Become an UNSTOPPABLE Nightfarer | Routing Strategies For ANY Run | Elden Ring

    Top 3 Broken And Op Wylder Builds in Elden Ring Nightreign

    Top 3 Broken And Op Wylder Builds in Elden Ring Nightreign

    Isso vai mudar o mundo do RPG | React Dungeons & Dragons: Honra entre rebeldes

    Isso vai mudar o mundo do RPG | React Dungeons & Dragons: Honra entre rebeldes

    Taobab Lynels 02 The Legend Of Zelda Breath Of The Wild Walkthrough Nintendo Switch

    Taobab Lynels 02 The Legend Of Zelda Breath Of The Wild Walkthrough Nintendo Switch

  • Retro Rewind
    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Game Players Issue 80 Magazine January 1996

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Video Game Trader Winter 2014

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Games April 1995

    Retro Rewind: Electronic Gaming Monthly Magazine Number 55 February 1994

    Retro Rewind: Electronic Gaming Monthly Magazine Number 57 April 1994

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: Blast from the Past – 35 Iconic Commercials of 1988!

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: PC World Magazine August 1998

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: Computer Shopper Magazine September 1997

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: PC Magazine December 2015

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

    Retro Rewind: EDGE Magazine RETRO #1: The Guide to Classic Videogame Playing and Collecting

  • Tech Art
    Augmented Reality with Aruco Markers: Bridging the Digital and Physical Worlds

    Augmented Reality with Aruco Markers: Bridging the Digital and Physical Worlds

    This took me 2 hours | Speed painting my logo | Digital painting | illustration

    This took me 2 hours | Speed painting my logo | Digital painting | illustration

    Virtual Makeup Design: Volume 1 with Neville Page

    Virtual Makeup Design: Volume 1 with Neville Page

    Perfectionism (ranting while drawing pixel art wallpapers)

    Perfectionism (ranting while drawing pixel art wallpapers)

    Africa Wants a More Accurate World Map

    Africa Wants a More Accurate World Map

    TUTORIAL MENGGAMBAR DIGITAL DI APLIKASI SKETCHBOOK!!

    TUTORIAL MENGGAMBAR DIGITAL DI APLIKASI SKETCHBOOK!!

    Pennsylvania Museum Sues Trump Administration Over Grant Cuts

    Pennsylvania Museum Sues Trump Administration Over Grant Cuts

    AK Interactive Terrains Asphalt (AK8013) – HO Scale Model Railroading

    AK Interactive Terrains Asphalt (AK8013) – HO Scale Model Railroading

    Pixel Art Tutorial – Character Sprite (32×32)

    Pixel Art Tutorial – Character Sprite (32×32)

  • Tech Deals
    7 Inch Plastic Traffic Cones Sport Training Agility Marker Cone for Soccer, Skating,…

    7 Inch Plastic Traffic Cones Sport Training Agility Marker Cone for Soccer, Skating,…

    Scrabble – Nintendo DS

    Scrabble – Nintendo DS

    Pendragon Studios: The Thing: Norwegian Outpost – Expansion to The Thing: Board Game,…

    Pendragon Studios: The Thing: Norwegian Outpost – Expansion to The Thing: Board Game,…

    Replacement Voice Remote Control for Insignia, Toshiba, Amazon Fire Smart TV

    Replacement Voice Remote Control for Insignia, Toshiba, Amazon Fire Smart TV

    StarTech.com USB 3.0 to Dual HDMI Adapter, USB to 2x HDMI Monitor Converter for Windows,…

    StarTech.com USB 3.0 to Dual HDMI Adapter, USB to 2x HDMI Monitor Converter for Windows,…

    SABRENT [3-Pack 22AWG Premium 6ft USB-C to USB A 3.0 Sync and Charge Cables [Black]…

    SABRENT [3-Pack 22AWG Premium 6ft USB-C to USB A 3.0 Sync and Charge Cables [Black]…

    KingSpec Z5 1TB External SSD – 2100MB/s, Portable Solid State Hard Drives with RGB…

    KingSpec Z5 1TB External SSD – 2100MB/s, Portable Solid State Hard Drives with RGB…

    intel Core i7-4770 Quad-Core Desktop Processor 3.4 GHZ LGA 1150 8 MB Cache BX80646I74770…

    intel Core i7-4770 Quad-Core Desktop Processor 3.4 GHZ LGA 1150 8 MB Cache BX80646I74770…

    Sata HDD & SSD Hot Swap Cage, 6 Bay Hard Drive Dock for 5.25” Enclosure, 6 Bay Hard…

    Sata HDD & SSD Hot Swap Cage, 6 Bay Hard Drive Dock for 5.25” Enclosure, 6 Bay Hard…

  • Techs Got To Eat
    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Spicy Chickpea Shakshuka Mug: 5-Minute Vegetarian Fuel

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Bacon & Spinach Mug Quiche: 3-Minute Gourmet Breakfast

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Cheesy Broccoli Rice Mug: 5-Minute Super Comfort Food

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Top 10 Vegetarian Recipes for 2025: Easy and Nutritious Meals for Busy People

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Mug Lasagna: 5-Minute Microwave Meat Lover’s Dream

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon Fried Rice Mug: 5-Minute Microwave Meal

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Bacon & Cheddar Mug Biscuit: 2-Minute Savory Comfort

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Loaded Bacon Cheesy Potato Mug: 5-Minute Comfort Food

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

    Peanut Butter Banana Mug Muffin: 5-Minute Protein Snack

  • Tesla
    For Tesla Cybertruck 2PCS Door Built-in Hidden Storage Organizer, Full Surround Design…

    For Tesla Cybertruck 2PCS Door Built-in Hidden Storage Organizer, Full Surround Design…

    Elon Musk is lying about Tesla’s self-driving and I have the DMs to prove it

    Elon Musk is lying about Tesla’s self-driving and I have the DMs to prove it

    Rear View Mirror Protector Frame, Interior Rear View Mirror Cover for Model 3 Y X S Semi…

    Rear View Mirror Protector Frame, Interior Rear View Mirror Cover for Model 3 Y X S Semi…

    Under Screen Storage Organizer Compatible with Tesla Model Y Juniper 2026-2025/Model 3…

    Under Screen Storage Organizer Compatible with Tesla Model Y Juniper 2026-2025/Model 3…

    Nycetek USB Hub for Tesla Model 3/Y, 45W PD Center Console Retractable Fast Charging,…

    Nycetek USB Hub for Tesla Model 3/Y, 45W PD Center Console Retractable Fast Charging,…

    MASHA Dashboard Cover for Tesla Model 3/Y, Flannel Dashboard Pad Dash Mat Compatible…

    MASHA Dashboard Cover for Tesla Model 3/Y, Flannel Dashboard Pad Dash Mat Compatible…

    J1772 to Tesla Charging Adapter 60 Amp / 250V AC Compatible with SAE J1772 EV Charger…

    J1772 to Tesla Charging Adapter 60 Amp / 250V AC Compatible with SAE J1772 EV Charger…

    Pickup Truck Cover Waterproof All Weather, Outdoor Indoor Truck Protection Cover for…

    Pickup Truck Cover Waterproof All Weather, Outdoor Indoor Truck Protection Cover for…

    Car LED Hood Light,Waterproof LED Light Strips Cool Monochromatic Car LED Light for CCar…

    Car LED Hood Light,Waterproof LED Light Strips Cool Monochromatic Car LED Light for CCar…

  • UFO
    Shocking Discoveries Voyager Made at the Edge of the Solar System

    Shocking Discoveries Voyager Made at the Edge of the Solar System

    FOCO Men’s NFL Team Logo Casual Hat Caps

    FOCO Men’s NFL Team Logo Casual Hat Caps

    New Era NFL Men’s Stated Short Sleeve Performance T-Shirt

    New Era NFL Men’s Stated Short Sleeve Performance T-Shirt

    Reddit’s Darkest Conspiracy Theories

    Reddit’s Darkest Conspiracy Theories

    QWinOut F550 Air Frame 550mm Wheelbase Drone Frame Kit for KK MK MWC DIY MultiCopter Hexacopter UFO Helicopter

    QWinOut F550 Air Frame 550mm Wheelbase Drone Frame Kit for KK MK MWC DIY MultiCopter Hexacopter UFO Helicopter

    Report to headquarters! Unidentified flying object detected!#owl #burrowingowl

    Report to headquarters! Unidentified flying object detected!#owl #burrowingowl

    Sky Viper Vista HD Video Drone

    Sky Viper Vista HD Video Drone

    Old Soviet spacecraft expected to hit Earth

    Old Soviet spacecraft expected to hit Earth

    Roswell, NM Tourism | Funny Alien Extraterrestrial UFO Saucer Men Women T-Shirt

    Roswell, NM Tourism | Funny Alien Extraterrestrial UFO Saucer Men Women T-Shirt

No Result
View All Result
Techcratic
No Result
View All Result
Home Hacker News

How a GraphQL Bug Resulted in Authentication Bypass

Hacker News by Hacker News
January 26, 2025
in Hacker News
Reading Time: 13 mins read
129
A A
0

Haoxi Tan
2024-07-29 17:00:00
www.hackerone.com

What Is an Authentication Bypass Vulnerability?

An authentication bypass vulnerability is a weakness in a system that fails to protect against unauthenticated access, allowing an attacker to bypass authentication entirely. There are many different attack vectors and vulnerabilities that lead to authentication bypass, such as SQL injection, insecure account recovery flows, or insecure use of cookies, but ultimately the impact is the same.

In this particular instance, the authentication bypass was enabled by an alternate channel: a GraphQL API with little to no access control, which exposed user creation and modification functionality.

Business Impact of Authentication Bypass

The business impact of authentication bypass is typically severe. Depending on the level of access the vulnerability allows one to gain access without authentication, sensitive data could be accessed and manipulated without any accountable audit trail as to who performed them. 

In the context of the bug discussed in this post, the impact would depend on how this promotional banner was implemented (via iframes or direct script loading). A malicious attacker may have abused this vulnerability to commit financial fraud, carry out social engineering attacks, redirect users to a different site, steal customer PII (Personally Identifiable Information), or deface the website, leading to financial, reputational, and regulatory consequences for the business.

Details: The Bug Report

The main e-commerce website had a promotion banner managed from a third-party integration, hosted on a separate subdomain but embedded on the main website. The third-party application had a GraphQL endpoint on which introspection was enabled, allowing full enumeration of all its endpoints and capabilities.

GraphQL introspection is a useful feature in development that exposes underlying schema via a query. This includes information such as the nodes and fields, their data types, and the queries and mutations that can be performed. It’s also very helpful to any potential attackers, as it allows them to thoroughly enumerate your GraphQL database and potentially perform dangerous actions.

An example introspection query fired from GraphQL Playground

A “mutation” is the GraphQL term for an operation that changes the “graph” (the underlying data). In this case, a mutation called Register was found by the researcher, and used to register a user account. Sensitive actions such as user registration should only be called from a backend, from a registration page well protected with measures such as anti-bot reCAPTCHA and email verification. Enabling a registration functionality from an API is not only dangerous to the application, but in this case, allows more sensitive actions to be taken in the GraphQL endpoint.

Finally, after finding and calling the CreateAdminUser mutation, the researcher was able to access even more functionality of the API, including modification of the banner content and details about the promotional products.

How Hackers Find Authentication Bypass Via GraphQL

GraphQL is a very popular technology, and it’s not uncommon to see it in use even if it’s not tagged as a technology you can filter programs by on HackerOne. So how and why do hackers find GraphQL Authentication Bypass vulnerabilities?

Q: What is it about GraphQL that makes you want to test it?

J. Francisco Bolivar: Being a bug hunter I am always on the lookout for new technologies that have not yet received much scrutiny from the security community. GraphQL, a newer API design paradigm, stands out because of its unique approach to data retrieval and queries. […] This capability also creates potential vulnerabilities such as DoS attacks through expensive queries or schema exposing introspection queries. Furthermore, since GraphQL is not as mature or widespread as REST, many implementations may lack robust security measures. Consequently, there exists a vast space for discovering unknown security flaws. My intention in testing GraphQL is to identify these gaps and contribute towards hardening this promising technology’s overall security posture.

 

Q: Immediately after you realize that GraphQL is being used, what’s your next step?

J. Francisco Bolivar: Once I realize that GraphQL is being used, my next step involves a series of reconnaissance and analysis actions to understand the structure, capabilities, and potential security weaknesses of the GraphQL implementation, Some of the steps I use to apply are:

  • Schema Introspection: Retrieve and examine the GraphQL schema, to grasp structure, types, queries, and mutations.
  • Sensitive Data Analysis: Looking for all sensitive fields that it might handle.
  • Query Complexity Testing: We want to make sure that the query complexity of our server is within certain limits and that its depth does not reach too deep so as to prevent potential resource exhausting attacks.
  • Authorization Checks: Try to access restricted data or carry out unauthorized operations to find out if there are any high-level authorization bypasses.
  • Input Validation Testing: Test input validation by sending crafted payloads that have been hand-crafted to fit the bill.
  • Error Message Analysis: Analyze error responses from Web Services in order to find out what kind of information leaks about the underlying infrastructure there may be.
  • Subscription Testing: If subscriptions are allowed, test for potential data leakage or unauthorized access while Real-Time data transmission is in use.

As Francisco Bolivar said, once the hacker finds the GraphQL endpoint, the first step is to enumerate any GraphQL endpoints for information about its schema. Note that queries can be sent both in the form of GET or POST requests. In a GET request, the query would be in a query parameter like this:

https://host/graphql?query=query{__typename}

In a POST request, it would be a request sent to https://host/graphql with the body:

If the target endpoint is indeed running GraphQL, it would respond with something like:

{“data”:{“__typename”:”Query”}}

To test if introspection is enabled, the hacker can send a basic introspection query:

query={__schema{types{name,fields{name,args{name,description,type{name,kind,ofType{name, kind}}}}}}}

If introspection is enabled, the hacker might paste the returned schema into GraphQL Voyager to visualize the entire graph and the relationships between different types and fields within them, as well as use tools like GraphQL Playground or Postman to see all the queries that can be made.

 

 

If introspection is not enabled, insights can still be gained into the schema by analyzing frontend Javascript source code, as the web application making requests to GraphQL endpoints need to know where and how to make them. Using the browser’s developer tools, an attacker may utilize the search functionality to search across all source code files on the site for keywords such as “graphql”, “query” and “mutation”.

 

Other ways to deduce schema information include brute-forcing and inspecting background HTTP traffic. A Burp extension called GraphQuail automatically analyzes traffic to GraphQL endpoints in Burp live proxy traffic to build a schema file, and it will emulate a GraphiQL or Voyager interface within the target website using an identifier added after the target endpoint.

 

 

If the hacker is not getting enough traffic, or doesn’t have a frontend website to get legitimate GraphQL queries, they may use a tool called clairvoyance which can brute force potential types in a wordlist, and analyze error messages from GraphQL servers to guess the schema since they can leak names through typo guessing:

While enumerating the schema, the attacker will look for authentication-related mutations that can be performed, such as registration of users, resetting passwords, changing user details (like email), or access permissions (like whether the user is an admin).

Furthermore, they’ll likely try to query fields belonging to users that might be sensitive to authentication-related information, such as auth tokens, passwords and MFA secrets that could aid in authentication bypass. During this process, they’ll also check for other vulnerabilities commonly present in GraphQL APIs, such as IDORs (Insecure Direct Object References), leaking of sensitive PII, and broken access control. 

So there are lots of vulnerabilities in GraphQL systems ripe for finding. But why are auth bypasses a common impact of GraphQL bugs? We asked Francisco Bolivar:

Q: Why is it common for GraphQL bugs to result in auth bypasses?

J. Francisco Bolivar: One often encounters authorization bypasses in GraphQL bugs, because of its query language and schema design which are both flexible and complex. A number of variables explain this:

  • Field-Level Granularity: The client is allowed to request particular data fields and nested data from GraphQl within a single query. In such circumstances, not all fields and types undergo equal authentication checks. An ineffective access control logic may determine permissions at a higher level than it can enforce by field or nested objects, accidentally allowing access to sensitive information.
  • Complex Schema Structures: GraphQL schemas can be quite complicated with deep nesting of types and relationships. This makes the implementation and maintenance of comprehensive access control rules more prone to oversight thereby resulting in chances of authorisation gaps.
  • Introspection Queries: GraphQL supports introspection queries that clients can use to discover the schema by default. Introspections when lacking proper security measures may help attackers find out about hidden fields, types and operations hence giving them valuable information they need to form queries that dodge checking authorizations.

How Can You Avoid GraphQL-Related Bugs in Your Applications?

Disabling GraphQL introspection definitely reduces an attacker’s visibility into your application, but there’s a game of balance here: if you have a bug bounty program, it may be beneficial to leave it on for testing or staging environments that researchers have access to so that they can quickly find critical issues such as authentication bypass and address the root causes. On the other hand, if you only make your production environment available to bug bounty hackers, then you should turn introspection off to minimize risk.

As for protecting against discovering the GraphQL schema via leaking correct types from suggestions in validation error messages, it’s currently not a first-class configuration feature in Apollo (which is one of the most popular GraphQL servers), but there’s a workaround using the formatError handler where you can string match for “Did you mean” and change the error message to something more generic.

The root cause of these types of vulnerabilities are, however, not GraphQL introspection, but the broken access control that allowed unauthenticated users to escalate privileges through sensitive mutations which they shouldn’t be allowed to call. To address this root cause, authorization must be explicitly specified for each query and mutation in the schema, with the appropriate permission levels (for example, a normal user should not be able to call the CreateAdminUser mutation). The most secure code is code that does not exist: extraneous functionality such as CreateAdminUser should not even exist if it’s not needed – the same goes with any other queries and mutations in a large GraphQL database.

Conclusion

With the rising popularity of GraphQL in web applications, it is essential to secure authentication and authorization correctly in GraphQL API, lest it becomes a path for attackers to bypass authentication and escalate privileges. With its large attack surface, GraphQL APIs should be constantly audited to lock down security permissions and remove unnecessary functionality. Fortunately, this severe vulnerability was found and reported via HackerOne’s bug bounty program and fixed within a matter of days. 

This bug was found during the 2023 HackerOne Ambassador World Cup (AWC), an eight-month-long, competition-driven way to build community engagement, collaboration, and ambassador brand awareness throughout the hacker community. We have some words from Francisco Bolivar about his own experience at the AWC:

Q: What do you like about participating in the Ambassador World Cup?

J. Francisco Bolivar: Participating in the Ambassador World Cup was one of the best experiences I had. It’s the most important bug bounty competition, and I’m proud to have won it with my team, Spain. The experience allows me to connect with a global community, challenge and enhance my skills, and engage in meaningful cultural exchanges. Winning the Best Bug prize for AS Watson adds to my pride and highlights the significant impact of our work.

The 2024 AWC is currently taking place! The AWC, led by HackerOne Brand Ambassadors, allows teams of hackers worldwide to identify impactful vulnerabilities in participating customer programs. Reach out to your customer success manager to learn more about how your program can engage in the 2024 tournament!

Secure Your Web Application From Authentication Bypass With HackerOne

The advantage of having a bug bounty program is that hackers from our community constantly test your new applications, domains, and API endpoints as soon as they go live. HackerOne and our community of ethical hackers are best equipped to help organizations identify and remediate Authentication Bypass and other vulnerabilities, whether through bug bounty, Pentest as a Service (PTaaS), Code Security Audit, or other solutions by considering the attacker’s mindset on discovering a vulnerability.

Download the 7th Annual Hacker Powered Security Report to learn more about the impact of the top 10 HackerOne vulnerabilities, or contact HackerOne to get started taking on Authentication Bypass vulnerabilities at your organization.

Source Link


Keep your files stored safely and securely with the SanDisk 2TB Extreme Portable SSD. With over 69,505 ratings and an impressive 4.6 out of 5 stars, this product has been purchased over 8K+ times in the past month. At only $129.99, this Amazon’s Choice product is a must-have for secure file storage.

Help keep private content private with the included password protection featuring 256-bit AES hardware encryption. Order now for just $129.99 on Amazon!


Unlock unlimited streaming with a free Amazon Prime trial!
Sign up today!

Help Power Techcratic’s Future – Scan To Support

If Techcratic’s content and insights have helped you, consider giving back by supporting the platform with crypto. Every contribution makes a difference, whether it’s for high-quality content, server maintenance, or future updates. Techcratic is constantly evolving, and your support helps drive that progress.

As a solo operator who wears all the hats, creating content, managing the tech, and running the site, your support allows me to stay focused on delivering valuable resources. Your support keeps everything running smoothly and enables me to continue creating the content you love. I’m deeply grateful for your support, it truly means the world to me! Thank you!

BITCOIN

Bitcoin Logo

Bitcoin QR Code

bc1qlszw7elx2qahjwvaryh0tkgg8y68enw30gpvge

Scan the QR code with your crypto wallet app

DOGECOIN

Dogecoin Logo

Dogecoin QR Code

D64GwvvYQxFXYyan3oQCrmWfidf6T3JpBA

Scan the QR code with your crypto wallet app

ETHEREUM

Ethereum Logo

Ethereum QR Code

0xe9BC980DF3d985730dA827996B43E4A62CCBAA7a

Scan the QR code with your crypto wallet app

Please read the Privacy and Security Disclaimer on how Techcratic handles your support.

Disclaimer: As an Amazon Associate, Techcratic may earn from qualifying purchases.

Tags: Hacker News
Share162Share28ShareShare4ShareTweet101
Hacker News

Hacker News

Stay updated with Hacker News, where technology meets entrepreneurial spirit. Get the latest on tech trends, startup news, and discussions from the tech community. Read the latest updates here at Techcratic.

Related Posts

Free & Open Source Jobs
Hacker News

Free & Open Source Jobs

August 28, 2025
1.3k
Open Source is one person
Hacker News

Open Source is one person

August 28, 2025
1.3k
How to prepare for the Bitnami Changes coming soon
Hacker News

How to prepare for the Bitnami Changes coming soon

August 28, 2025
1.3k
Google executive says company has cut a third of its managers
Hacker News

Google executive says company has cut a third of its managers

August 27, 2025
1.3k
Asahi Linux Lead Developer Steps Down
Hacker News

Asahi Linux Lead Developer Steps Down

August 27, 2025
1.3k
On-screen and now IRL: FSU researchers find evidence of ChatGPT buzzwords turning up in everyday speech
Hacker News

On-screen and now IRL: FSU researchers find evidence of ChatGPT buzzwords turning up in everyday speech

August 27, 2025
1.3k
Apple Revokes EU Distribution Rights for Torrent Client, Developer Left in the Dark * TorrentFreak
Hacker News

Apple Revokes EU Distribution Rights for Torrent Client, Developer Left in the Dark * TorrentFreak

August 27, 2025
1.3k
F-35 pilot held 50-minute airborne conference call with engineers before fighter jet crashed in Alaska
Hacker News

F-35 pilot held 50-minute airborne conference call with engineers before fighter jet crashed in Alaska

August 27, 2025
1.3k
Load More
Next Post
Smartphone

Samsung Galaxy S25 series arrives, Week 4 in review

Your Tech Resources

  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Forbes
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo
  • Google News
  • Hacker News
  • Harvard Tech
  • I Like Cats ™
  • I Like Dogs ™
  • LifeHacker
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • PC World
  • Photofocus
  • Physics
  • Random Tech
  • Retro Rewind ™
  • Robot Report
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Art
  • Tech Careers
  • Tech Deals
  • Techcratic ™
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Tech News

  • 30 Second Tech ™
  • AI
  • Apple Insider
  • Ars Technica
  • CNET
  • ComputerWorld
  • Crypto News
  • Cybersecurity
  • Endgadget
  • ExtremeTech
  • Fossbytes
  • Gaming
  • GeekWire
  • Gizmodo

Tech News

  • Harvard Tech
  • MacRumors
  • Macworld
  • Mashable
  • Microsoft
  • MIT Tech
  • Physics
  • PC World
  • Random Tech
  • Retro Rewind ™
  • SiliconANGLE
  • SlashGear
  • Smartphone
  • StackSocial
  • Tech Careers

Tech News​

  • Tech Art
  • TechCrunch
  • Techdirt
  • TechRepublic
  • Techs Got To Eat ™
  • TechSpot
  • Tesla
  • The Verge
  • TNW
  • Trusted Reviews
  • UFO
  • VentureBeat
  • Visual Capitalist
  • Wired
  • ZDNet

Site Links

  • About Techcratic
  • Affiliate Disclaimer
  • Affiliate Link Policy
  • Contact Techcratic
  • Dealors Discount Store
  • Privacy and Security Disclaimer
  • Privacy Policy
  • RSS Feed
  • Site Map
  • Support Techcratic
  • Techcratic
  • Tech Deals
  • TOS
  • 𝕏
Click For A Secret Deal

Dyson’s Labor Day sale includes a 50-percent discount on the 360 Vis Nav robot vacuum

Merging HR And IT Under One Umbrella

Pixel 10 Pro XL vs. Galaxy S25 Ultra: Android Camera Battle

Bitget Records Over Half a Trillion Monthly Derivatives Average, Tops ETH and SOL Liquidity in CoinDesk Report

Web Coordinator

New procedural memory framework promises cheaper, more resilient AI agents

Techcratic – Your All In One Tech Hub
© 2020 – 2025
All Rights Reserved
∞

No Result
View All Result
  • 30 Second Tech ™
  • AI
  • App Zone ™
  • Apple
  • Ars Technica
  • CNET
  • Crypto News
  • Cybersecurity
  • Endgadget
  • Gaming
  • I Like Cats ™
  • I Like Dogs ™
  • MacRumors
  • Macworld
  • Tech Deals
  • Techcratic ™
  • Techs Got To Eat ™
  • Tesla
  • UFO
  • Wired