CameronDev

joined 1 year ago
[–] [email protected] 165 points 8 months ago

That kinda sounds reasonable. Especially if it can prevent someone going down that rabbithole? Good job PH.

[–] [email protected] 3 points 8 months ago

I appreciate you have put effort into this, and you have gone out of your way to make it safer, but if the extension were to become malicious at a later date, expanding permissions (and relying on users brainlessly-clicking accept) or using an exploit or sidechannel would undo any of that.

The downside of browser extensions is that they are operating within a massive codebase, and thus have a huge attack surface if they decide to become malicious.

For what its worth, I commend your efforts here, its just near impossible to trust any peice of software not backed by the reputation of an established company/developer.

[–] [email protected] 11 points 8 months ago (2 children)

This is a privacy community. Half the posters here think their toaster is listening to their thoughts. Browser extensions are a serious and known vector for malware, installing one from a no-name developer and handing it your tfa codes is a high level of blind trust.

[–] [email protected] 4 points 8 months ago (2 children)

With all due respect, it doesnt matter what the code is right now. This is an extension that you can update at any point in the future to replace with something malicious.

Trust is near impossible to build in todays internet.

https://www.kaspersky.com.au/blog/dangerous-chrome-extensions-87-million/32170/

Note that a plugin’s malicious functionality can evolve over time in line with its owners’ goals. And the owners themselves may change: there have been cases when malicious features appeared in a previously safe extension after its creators sold the plugin to someone else.

[–] [email protected] 7 points 8 months ago (15 children)

It's also an extension with 1 review, by a no-name developer, with only 12 installs... definitely would trust that...

[–] [email protected] 1 points 8 months ago

Same, Uptime Kuma is fantastic. I put it on my most critical server, if Kuma is down, everything is down :D

[–] [email protected] 17 points 8 months ago (4 children)

We've all.committed that sin before. Its better to rely on it surviving the reboot than to try prevent the reboot.

Also worth looking into some form of uptime monitoring software. When something goes down, you want to know about it asap.

And documenting your setup never hurts :D

[–] [email protected] 34 points 8 months ago (8 children)

Did the services fail to come back due to the bad reboot, or would they have failed to come back on a clean reboot? I ugly reboot my stuff all the time, and unless the hardware fails, i can be pretty sure its all going to come back. Getting your stuff to survive reboot is probably a better spend of effort.

[–] [email protected] 5 points 8 months ago

It may be obscure, but that doesnt make it less of coincidence. Also, there is a pretty significant cross.over between tech people and car people (and a greater crossover with car owners).

[–] [email protected] 15 points 8 months ago (4 children)

Every day, millions of people discuss oil changes. If an article (was it an article or an ad?) is published on oil changes on X date, it is going to coincide with a large number of unlinked conversations. Today, it was you.

Once is a coincidence, if you can prove a pattern then you should concerned.

[–] [email protected] 35 points 8 months ago (3 children)

"It landed didnt it"

[–] [email protected] 3 points 9 months ago* (last edited 9 months ago) (1 children)

I was a little on the fence as well tbh, but decided that it wasnt too bad. Valentines chocolates would be bad, but a more generic box of nice chocolates less so? I think maybe its situational? Im a man though, so my opinion may not matter

view more: ‹ prev next ›