NastyBigPointyTeeth!🌈♀ · @MsDropbear
209 followers · 1180 posts · Server kolektiva.social

@TiffyBelle @flaminghohners T/y. That was an interesting read, & ostensibly disturbing. Ostensibly.

My geeky-user-but-NO-expert familiarity with [, specifically] & chromium-based browsers [on my ( only) pc's that's & ] extends to matters of features, functions & privacy. Security, in the context of that paper & its links, is way beyond my knowledge, so it'd be silly of me to attempt any technical disparagement of that paper.

I shall note, though, that browser development is a pretty fast-paced project, such that i do wonder about the contemporary validity of any paper written several years ago. The paper was last edited March 19th, 2022, so clearly not too bad. However, & IMO most unfortunately, ALL its purportedly supportive links to external references are VERY old, ranging from newest of 2020, to oldest of 2011, with a perceived median around 2016.

For instance, the linked paper's linked paper "Exploiting and Protecting Dynamic Code Generation", says on p10, within "A. Setup", that

>The operating system is the 64-bit Ubuntu 13.04 with kernel 3.8.0-35-generic

That version was released in early 2013.

I suspect this potential "technological aging" makes many or maybe most of the underlying claims rather dubious today, unless & until a contemporary reappraisal by technically competent peeps were done, based on current code, not on how it used to be many years ago. Maybe the conclusion would not change? Maybe it would? 🤷‍♀️

Other Thoughts, fwiw.

Even with a generous assumption that all claims in that paper remain technically valid today [tbc], for many browser users in countries / jurisdictions not overtly fascist & dictatorial, who as individuals are unlikely to be targeted by state-actors, i respectively opine that the larger more probable safety hazard to them might come from , not , breaches. To that extent, i note these:

- is more powerful in Firefox than in chromium browsers, due to the latter having no support for CNAME-uncloaking

- Google is actively striving, via its Mv3 replacement for Mv2, & its egregious FLoC / Topics crap, to further weaken uBO & all other . Otoh, Mozilla intends indefinite Firefox support for Mv2, albeit also with added Mv3 compatibility.

-- / like are far more than "only" adblockers. By running in "hard mode" for instance, & liberally creating a suite of global & per-site dynamic filters, AND having globally disabled but allowed by the user on favoured sites, great privacy protection is afforded. Google's plans are to actively weaken this user privacy in Chromium.

- sadly, silly insecure-by-design MS Windows remains the world's dominant OS. Yet for those alert to the Windows hazards & willing to make a change, provides vastly more security & privacy by design.

- As well, both dominant & at least one , now provide stable everyday capability instead of the ancient insecure / -- thus eliminating one classic security vulnerability mentioned in the paper/s.

- Linux users can avail themselves of even more privacy by their apps. There's several choices; i use . Therefore browsers [& all other relevant apps] cannot access any of the user's private data beyond the sandbox's bounds.

#firefox #nightly #Linux #vivaldisnapshot #chromium #privacy #security #ublockorigin #adblockers #addons #extensions #ubo #javascript #desktopenvironments #windowmanager #wayland #x11 #xorg #displayserver #sandboxing #firejail

Last updated 1 year ago

9to5Linux · @9to5linux
4519 followers · 2166 posts · Server floss.social

#displayserver #mir #Wayland

Last updated 4 years ago

https://purl.org/rzr# · @rzr
259 followers · 1627 posts · Server mastodon.social

s3d.sourceforge.net/# : is a network which can be used as environment using

#S3D #3dDesktop #sdl #3d #displayserver

Last updated 5 years ago