Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

https://cs.chromium.org/chromium/src/components/google/core/...

Just thinking out loud.

What happens, let's say, if someone malicious buys youtube.vg and puts a SSL certificate on it ? Will they be able to collect the ID ?

I guess so ?



sort by: page size:

Is it safe to assume that https://codecov.io/env was not compromised?

This obviously should not be added to the list of trusted CAs in any browser, and these certs should not be used in the public web. Unfortunately, neither should many certificate authorities be trusted.

https://www.youtube.com/watch?v=pDmj_xe7EIQ


Some useful context here:

https://chromium.googlesource.com/chromiumos/third_party/rus...

Seems there are 3-4 folks who helped build this and spent a lot of time doing initial audits; they outsource crypto algorithm audits to specialists.




Firefox:

https://bugzilla.mozilla.org/show_bug.cgi?id=1021232

https://bugzilla.mozilla.org/show_bug.cgi?id=1021235

The spec talks about both securing the CDM with Sandboxing and preventing fingerprinting, amongst other security + privacy issues that should be addressed:

https://w3c.github.io/encrypted-media/#cdm-security

https://w3c.github.io/encrypted-media/#privacy-fingerprintin...

the spec also says if the CDN isn't sandboxed then the user needs to be warned and prompted to allow exec:

> if a user agent chooses to support a Key System implementation that cannot be sufficiently sandboxed or otherwise secured, the user agent should ensure that users are fully informed and/or give explicit consent before loading or invoking it.


https://static.ctctcdn.com/

Console throws up this warning about M70 though.

> The SSL certificate used to load resources from https://static.ctctcdn.com will be distrusted in M70. Once distrusted, users will be prevented from loading these resources. See https://g.co/chrome/symantecpkicerts for more information.


I wonder: does Secure Memory Encryption [1] help against this?

[1]: https://www.amd.com/en/developer/sev.html



here is a detailed look at one particular example:

https://securelist.com/chrome-0-day-exploit-cve-2019-13720-u...


Isn't that exactly what https://www.cve.org/ would be for?


https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Sc...

Edit: this focuses on script tags and other means to inject code, but most defenses also work for other injected tags



1. Include https://hot-new-metrics-startup.com/tracker.js

2. hot-new-metrics-startup gets hacked. Sends over malicious js

3. Your page is no longer secure. https certificate remains.

We can argue semantics, but I guess I'm more concerned about the end result than semantics.


Probably this: https://www.zdnet.com/article/openpgp-flooded-with-spam-by-u...

It has no effect on GitHub, though, which doesn’t use keyservers as part of its validation process.


https://lgtm.com/

LGTM recently came by my project offering to integrate with GitHub. It's found a decent number of bugs other linters and my test suite didn't find, and it didn't require any setup at all; you just open your project on their website.

Their staff also reacted really quickly when I asked them questions or reported bugs.

For the most part, their only false positives are things like unreachable code, which I sometimes used to leave in for future-proofing, but I eventually did things their way, because it does make sense that it could be confusing to a third party.

The only alert I've ever suppressed was a string search for "example.com", which could have matched "example.com.untrusted-attacker.com". It was just code for displaying a reminder, not anything security-critical, so I didn't think it was worth fixing.


https://www.youtube.com/watch?v=iUMsPppwIH4&index=5&list=PLt... might bring some confidence. We hear from other security experts that we're considered an example in how we handle security.

https://github.com/jcushman/libgfshare/blob/master/src/libgf...

this has obvious timing and cache sidechannels on the secret data.

(IIRC SSSS is even worse, however.)

next

Legal | privacy