GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Notices by Yellow Flag (wpalant@infosec.exchange)

  1. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Thursday, 24-Apr-2025 08:36:29 JST Yellow Flag Yellow Flag
    in reply to
    • Ryan Castellucci :nonbinary_flag:

    @ryanc I trust it that you personally considered everything with your own IP parsing library but really: this is bad general advise. The trouble starts when your library processes that “cursed inet_aton nonsense” and passes it on to something that actually uses inet_aton or similar logic. And then your security checks are no longer valid because what you considered a DNS-resolvable host name is treated as an IP address further along the line, or what you considered decimal numbers is treated as octal. I’ve seen vulnerabilities due to such parser mismatches and avoiding them is very tricky.

    In conversation about 16 days ago from gnusocial.jp permalink
  2. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Thursday, 24-Apr-2025 04:25:13 JST Yellow Flag Yellow Flag
    • Adam ♿
    • Raven667
    • Ryan Castellucci :nonbinary_flag:

    @raven667 @NewtonMark @voltagex @ryanc Yep, the IP address parsing is a minefield. Tons of different formats (octal, hexadecimal, IPv4-mapped IPv6 only to name a few), all supported. So many security issues due to this…

    In conversation about 16 days ago from infosec.exchange permalink
  3. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Tuesday, 25-Mar-2025 06:18:25 JST Yellow Flag Yellow Flag

    Well, who am I to argue with hCaptcha that land turtles don’t swim in the sea? Unlike me, our new AI overlords actually know what “being human” means.

    In conversation about 2 months ago from infosec.exchange permalink
  4. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Wednesday, 22-Jan-2025 19:27:31 JST Yellow Flag Yellow Flag
    in reply to
    • Michał "rysiek" Woźniak · 🇺🇦

    @rysiek It seems that Cloudflare has only 6 data centers in Germany. There is a single data center in all of North Rhine-Westphalia with its 18 million people. Yes, this isn’t exactly impressive position pinpointing.

    I guess somebody on the run who doesn’t want to disclose which country they are in would be concerned about this issue. Then again, they probably wouldn’t want to expose their real IP address to the Signal infrastructure in the first place.

    In conversation about 4 months ago from infosec.exchange permalink
  5. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Thursday, 16-Jan-2025 09:15:52 JST Yellow Flag Yellow Flag
    • Soatok Dreamseeker

    A bunch of years ago I recommended against the use of the Session messenger (a Signal fork) but that wasn’t due to its technical merits. I found it concerning what kind of audience that messenger addresses. If the app is geared towards white nationalists, sexists and the like, then nobody else should help improve its image with their presence. Mind you, that was a long time ago and I don’t know whether they’ve improved.

    But @soatok took apart their cryptographic approach now and… well, I better just quote him:

    “run, screaming, in the other direction from Session.”

    Yes, it’s that bad.

    https://soatok.blog/2025/01/14/dont-use-session-signal-fork/

    In conversation about 4 months ago from infosec.exchange permalink
  6. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Tuesday, 14-Jan-2025 04:32:26 JST Yellow Flag Yellow Flag
    • tuckner

    I meant to publish a rant about Google and Chrome Web Store for a while now, and now it is out: https://palant.info/2025/01/13/chrome-web-store-is-a-mess/

    This details many of Google’s shortcoming at keeping Chrome Web Store safe, with the conclusion: “for the end users the result is a huge (and rather dangerous) mess.”

    I am explaining how Google handled (or rather didn’t handle for most part) my recent reports. How they make reporting problematic extensions extremely hard and then keep reporters in the dark about the state of these reports. How Google repeatedly chose to ignore their own policies and allowed shady, spammy and sometimes outright malicious extensions to prevail.

    There is some text here on the completely meaningless “Featured” badge that is more likely to be awarded to malicious extensions than to legitimate ones. And how user reviews aren’t allowing informed decisions either because Google will allow even the most obvious fakes to remain.

    I’ve also decided to publish a guest post by a researcher who wanted to remain anonymous: https://palant.info/2025/01/13/biscience-collecting-browsing-history-under-false-pretenses/

    This post provides more details on BIScience Ltd., another company selling browsing data of extension users. @tuckner and I wrote a bit about that one recently, but this has been going on since at least 2019 apparently. Google allows it as long as extension authors claim (not very convincingly) that this data collection is necessary for the extension’s functionality. It’s not that Google doesn’t have policies that would prohibit it, yet Google chooses not to enforce those.

    #google #cws #ChromeExtensions #privacy #ChromeWebStore

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments



  7. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Thursday, 09-Jan-2025 09:12:42 JST Yellow Flag Yellow Flag
    • Dan Goodin

    My research on how Chrome extensions spam Chrome Web Store search with irrelevant keywords has been picked up by @dangoodin: https://arstechnica.com/security/2025/01/googles-chrome-web-store-has-a-serious-spam-problem-promoting-shady-extensions/

    The article quotes me towards the end, something that is worth repeating:

    “It wasn’t that hard to notice, and they have better access to the data than me. So either Google isn’t looking or they don’t care.”

    #cws #ChromeWebStore #google #ChromeExtensions #spam

    In conversation about 4 months ago from infosec.exchange permalink

    Attachments


  8. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Monday, 22-Jan-2024 07:08:03 JST Yellow Flag Yellow Flag
    in reply to
    • Emelia 👸🏻

    @thisismissem Difficult. If we spin this analogy further: you gave me your key for a specific purpose (e.g. pizza delivery while you were out), after which I returned it to you. You didn’t allow me to make a copy of this key and use it later to rearrange the furniture for example.

    Abusing hardcoded credentials can definitely constitute hacking and cause perfectly justified criminal charges. But intention and damage caused definitely need to go into the equation, not merely “circumvention of protection mechanisms.”

    In conversation about a year ago from infosec.exchange permalink
  9. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Thursday, 18-Jan-2024 21:40:31 JST Yellow Flag Yellow Flag

    German law is making security research a risky business.

    Current news: A court found a developer guilty of “hacking.” His crime: he was tasked with looking into a software that produced way too many log messages. And he discovered that this software was making a MySQL connection to the vendor’s database server.

    When he checked that MySQL connection, he realized that the database contained data belonging to not merely his client but all of the vendor’s customers. So he immediately informed the vendor – and while they fixed this vulnerability they also pressed charges.

    There was apparently considerable discussion as to whether hardcoding database credentials in the application (visible as plain text, not even decompiling required) is sufficient protection to justify hacking charges. But the court ruling says: yes, there was a password, so there is a protection mechanism which was circumvented, and that’s hacking.

    I very much hope that there will be a next instance ruling overturning this decision again. But it’s exactly as people feared: no matter how flawed the supposed “protection,” its mere existence turns security research into criminal hacking under the German law. This has a chilling effect on legitimate research, allowing companies to get away with inadequate security and in the end endangering users.

    Source: https://www.heise.de/news/Warum-ein-Sicherheitsforscher-im-Fall-Modern-Solution-verurteilt-wurde-9601392.html

    In conversation about a year ago from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: heise.cloudimg.io
      Warum ein Sicherheitsforscher im Fall Modern Solution verurteilt wurde
      from heise online
      Der Programmierer, der eine gravierende Lücke in der Software der Firma Modern Solution aufgedeckt, fällt unter den Hackerparagrafen, meint das Gericht.
  10. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Sunday, 03-Dec-2023 02:10:54 JST Yellow Flag Yellow Flag

    For a brief moment there I thought that Google finally decided that event listeners added by extension’s content scripts should not receive synthetic (untrusted) events by default. I mean, we’ve had that in Firefox at least a decade ago. Quite a showstopper for exploiting extension vulnerabilities.

    No, that was merely a bug in my code…

    In conversation Sunday, 03-Dec-2023 02:10:54 JST from infosec.exchange permalink

    Attachments


  11. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Thursday, 19-Oct-2023 23:10:27 JST Yellow Flag Yellow Flag

    The Ubuntu debacle just shows that quality of localization is an underappreciated problem. For most projects, there are only a handful languages with enough contributors to catch the most glaring issues. And what do you do about the rest of them?

    Even without malicious contributors, translation issues are common. There are too literal translations, translations missing the context and your regular translation mistakes. But I’ve also seen bogus automated translations being submitted way too often.

    And that isn’t only an issue with open source projects that rely on volunteer contributors. Some of the worst translations I’ve seen came from translation agencies, even those promising to have translation checks in place. Presumably, they pay employees for quantity, not quality. And bad translations are rarely noticed, so there are no consequences.

    Back in the day I’ve been juggling 40+ languages, reviewing changes and attempting to recognize translation issues without speaking the language. It was a time-consuming and complicated job. I didn’t like doing it, but at least I would definitely have recognized malicious submissions like the ones Ubuntu tripped over.

    Most projects barely review translations or skip reviews completely. Instead, they rely on end users to report issues, which almost never happens. Worse yet: it is very typical to allow HTML injection via translations, so malicious translations can cause real security trouble.

    https://www.bleepingcomputer.com/news/security/ubuntu-discovers-hate-speech-in-release-2310-how-to-upgrade/

    In conversation Thursday, 19-Oct-2023 23:10:27 JST from infosec.exchange permalink
  12. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Friday, 15-Sep-2023 03:40:34 JST Yellow Flag Yellow Flag

    We are currently witnessing the fallout from monopolization in the browser space. Back in 2007, Internet Explorer received much criticism for its phishing protection mechanism which transmitted all visited websites to Microsoft servers. Mozilla paired up with Google and designed a different system which performed most checks locally and preserved users’ privacy. That’s what healthy competition looks like.

    Fast forward to 2023. Almost all web browsers in use are either Chrome or based on the Chromium browser engine. With the competition pretty much eliminated, Google is now pushing its “Enhanced Safe Browsing” down everyone’s throats – which is a nice sounding name for “every website you visit is sent to our servers.” The Internet Explorer approach from 2007 all over again, only that now it’s Google getting all this data. And they certainly won’t do anything evil with it. Yeah, sure.

    Reminder: Firefox and Safari are the only remaining browsers worth noting which are not using Google’s browser engine.

    #Chrome #Google #Mozilla #privacy

    https://www.bleepingcomputer.com/news/google/google-is-enabling-chrome-real-time-phishing-protection-for-everyone/

    In conversation Friday, 15-Sep-2023 03:40:34 JST from infosec.exchange permalink
  13. Embed this notice
    Yellow Flag (wpalant@infosec.exchange)'s status on Tuesday, 29-Aug-2023 22:42:54 JST Yellow Flag Yellow Flag

    Many people seem still unaware of just how bad Chrome Sync is for your privacy. By default, Chrome will sync all your data – including e.g. your passwords, bookmarks, browsing history and open tabs. And by default, Chrome will not encrypt any of this data. All of it will be accessible by Google, by anyone who subpoenas Google to turn up your data and whoever else managed to get access to these servers.

    If you want this data encrypted before it is first uploaded, you need to click “Settings” instead of confirming sync, then expand “Encryption options” and set up a sync passphrase. The default option “Encrypt synced passwords with your Google Account” is essentially a disguised “We can access all your data but we promise not to look. Don’t you trust us?”

    The only positive aspect here: Chrome Sync used to be a lot worse. It used to enable automatically when you signed into Chrome. It used to encrypt only passwords and none of the other data even if you set up a passphrase. It used to warn you when setting a passphrase because Google’s web services would no longer be able to access your passwords. It used to upload data without encryption first, only allowing to enable encryption after the fact. And its encryption used to be horribly broken. I wrote about that five years ago: https://palant.info/2018/03/13/can-chrome-sync-or-firefox-sync-be-trusted-with-sensitive-data/#chrome-sync

    But even now, Chrome Sync requires you to take action in order to get privacy. Because Google knows that you won’t. Compare that to Firefox Sync which has always been encrypting all data by default. I criticized the implementation here as well, but that was really a minor issue compared to the mess which is Chrome Sync.

    #Google #GoogleChrome #privacy

    Edit: Removed link to a post claiming that Google is censoring synced bookmarks. This claim appears to be incorrect, the message there referring to a different Google service.

    In conversation Tuesday, 29-Aug-2023 22:42:54 JST from infosec.exchange permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: palant.info
      Can Chrome Sync or Firefox Sync be trusted with sensitive data?
      from Wladimir Palant
      When using Chrome Sync or Firefox Sync, you should always choose a long randomly generated passpharse. Otherwise, your passwords won't be sufficiently protected.

User actions

    Yellow Flag

    Yellow Flag

    Wladimir Palant, software developer and security researcher, browser extensions expert. / searchable#infosec #cybersecurty #cryptography #privacy

    Tags
    • (None)

    Following 0

      Followers 0

        Groups 0

          Statistics

          User ID
          164735
          Member since
          29 Aug 2023
          Notices
          13
          Daily average
          0

          Feeds

          • Atom
          • Help
          • About
          • FAQ
          • TOS
          • Privacy
          • Source
          • Version
          • Contact

          GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

          Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.