valaramech

joined 1 year ago
[–] [email protected] 6 points 4 months ago (7 children)

Just went ahead and Googled it and I can find no credible source that he actually said these words at any time. So, if you'd like to bandy out that source, I think we'd all appreciate it.

[–] [email protected] 11 points 4 months ago (4 children)

Direct linking via a specific CDN was the problem. This is solved by bundlers, not caused by it.

The polyfill.js is a popular open source library to support older browsers. 100K+ sites embed it using the cdn.polyfill.io domain. ... However, in February this year, a Chinese company bought the domain and the Github account. Since then, this domain was caught injecting malware on mobile devices via any site that embeds cdn.polyfill.io.

[–] [email protected] 2 points 4 months ago (1 children)

In my experience, first-party JavaScript is more likely to be updated so rarely that bugs and exploits are more likely than supply chain attacks. If I heard about NPM getting attacked as often as I hear about CDNs getting attacked, I'd be more concerned.

[–] [email protected] 14 points 4 months ago (3 children)

I actively do this with uMatrix - granted, I only block non-first-party JavaScript. Most sites I visit only require a few domains to be enabled to function. The ones that don't are mostly ad-riddled news sites.

There are a few exceptions to this - AWS and Atlassian come to mind - but the majority of what I see on the internet does actually work more or less fine when you block non-first-party JavaScript and some even when you do that. uMatrix also has handy bundles built-in for certain things like sites that embed YouTube, for example, that make this much easier.

Blocking non-first-party like I do does actually solve this issue for the most part, since, according to the article, only bundles that come from the cdn.polyfill.io domain itself that were the problem.

[–] [email protected] 11 points 5 months ago (10 children)

A PiHole functions has a full DNS server. You can configure it to serve any arbitrary records you like - which is basically how it overrides ad domains to prevent them from loading.

So, if you know the IP address that a particular domain is supposed to route to, you configure the PiHole to respond with that IP address for that domain. So, it doesn't matter that the major DNS servers return junk because your PiHole never asks them.

[–] [email protected] 2 points 5 months ago

In this theoretical system, ideally it's illegal for anyone other than the person who's supposed to have the private key to have it - excepting some subset of legal reasons (e.g. parents for their children). So, the only business that would be asking for people's private keys are the kind that are already operating outside of the law.

[–] [email protected] 4 points 5 months ago

This is no longer the case. Any SSN issued after 2011 is fully randomized

Additionally, the following SSNs are always invalid:

  1. Any SSN with "000", "666", or "900"-"999" in the former area number
  2. Any SSN with "00" as the former group number
  3. Any SSN with "0000" in the former serial number.
[–] [email protected] 3 points 5 months ago (2 children)

That's kinda backwards, isn't it? If I want to verify my identity to a company, they would send me something that only I could decrypt. Some government agency provides all the public keys of all citizens, the company takes my public key, encrypts some secret with it, sends it to me, and asks me to decrypt and return it. If I'm able to do so, I must be who I say I am otherwise I would not be able to decrypt the secret.

In an ideal world, the company (or, even better, the employee) would have a similar certificate that I could use to encrypt my response with.