Neptr

joined 8 months ago
[–] Neptr@lemmy.blahaj.zone 8 points 5 months ago

This made me immediately think of how old American homes in the back of the mirror cabinet of the bathroom just had a slot that fed into the space between the drywall so you could through your razerblades away. Good luck to the renovators in 50 years when they need to remove that drywall and pick up a thousand rusty butterfly-style razerblades. Can't throw those suckers in a plastic trashbag either cus it'll cut right through.

[–] Neptr@lemmy.blahaj.zone 8 points 5 months ago (1 children)

I actually love that channel lol. A friend showed it to me a while ago and it is performance art (in the jerma985 sense).

[–] Neptr@lemmy.blahaj.zone -1 points 5 months ago

Yeah okay.

My logic was that it is much more likely that someone will spoof there useragent already if they are on Linux. If threat actor is targeting not just Windows but also Linux, they probably would understand the very real likelyhood of platform spoofing.

[–] Neptr@lemmy.blahaj.zone -1 points 5 months ago (5 children)

That isnt a great defense against malware "imho". Security through assuming the threat actor is lazy is just not security. It doesnt take like any effort on their part to just use some off-the-shelf OS fingerprinting code. It isnt worth it either because it contributes to your overall fingerprint, since normal RFP users have a standardized useragent for Windows and Linux separately.

[–] Neptr@lemmy.blahaj.zone 4 points 5 months ago (2 children)

Firstly there is no need to be condescending.

Secondly, do you block all JS? NoScript is not a silver bullet and doesnt stop fingerprinting, it is itself identified by the CreepJS test site. It may in this case reduce the chance of OS fingerprinting, but pure CSS methods exist as well.

Additionally, NoScript is laregly redundant with uBlock Origin since you can do everything that it offers, such as blocking 3rd party scripts/iframes/all, block fonts, block JS, and it is very granular.

Bottom line, you are fingerpintable.

[–] Neptr@lemmy.blahaj.zone -1 points 5 months ago* (last edited 5 months ago) (2 children)

It is trivial to identify OS platform because browser work differently on each platform. Wjat Librewolf does with useragent on Linux actually is makes users stand out more because it isn't what privacy.resistFingerprinting (RFP) reports on normally.

Hackers (like the comment scenario i was responding to) are substantially more likely to employ platform fingerprint than trust a fale useragent. And loads general websites employ fingerprinting, meaning deviation from default RFP behaviour makes you stand out (more than you already do by using RFP since it is a small pool already).

[–] Neptr@lemmy.blahaj.zone 4 points 5 months ago (4 children)

You can lie, but that doesnt mean that a website cant still tell your base OS if they use JS platform fingerprinting. Arkenfox, the base config which Librewolf is based off of says the exact same thing. Go to CreepJS and see it get your platform regardless.

[–] Neptr@lemmy.blahaj.zone 8 points 5 months ago* (last edited 5 months ago) (1 children)

Yeah, kinda like when it gets decrypted on your device to read it. They dont need to compromise E2EE if the AI is added to the client application (aka one of the "ends").

[–] Neptr@lemmy.blahaj.zone 30 points 5 months ago (1 children)

Look again. Reverse the numbers and you get 2102. Feel old yet? Look again.

[–] Neptr@lemmy.blahaj.zone 1 points 5 months ago

I was just kidding. I know that no one uses that in common conversation, but it'd be funny of everyone went around saying the standard by its identifier.

[–] Neptr@lemmy.blahaj.zone 7 points 5 months ago (2 children)

Ah yes, ISO8601. Just rolls of the tongue, doesn't it?

view more: ‹ prev next ›