• 0 Posts
  • 22 Comments
Joined 1Y ago
cake
Cake day: Jun 18, 2023

help-circle
rss

The major one that concerns me is who is behind them. Even if we trust that their encryption is not backdoored, there is a lot of information that can be gathered just from the frequency of messages and who they are between.

If it came out that a three letter agency was running one of these networks, it would not suprise me at all.

https://en.m.wikipedia.org/wiki/Operation_Trojan_Shield


I’m not convinced the VPNs actually make financial sense, I kinda wonder if there is someone funding them. They market so aggressively, and are priced so cheaply it doesnt quite make sense to me.


Pages are statically generated

Can you elaborate on that? To me, statically generated would mean you are pre-rendering a html page for every possible search, which doesnt sound possible? Do you mean that its all server side generated (at the time of search)?


Essentially, yeah? Unless you calculate the OTPs by pen and paper, you have to use some kind of software, and therefore you have to trust that it is safe. Writing your own like OP is actually a very safe option, because you can trust yourself, but everyone else needs to trust OP.

Attack vectors apply to the add-on itself, it is (potentially) the shady site. OP has the potential to update the add-on later with its own malicious code. This is true of all addons, hence the trust issue.

I dont have any problem with OP advertising their addon, but potential users should be aware of the risks.


I appreciate you have put effort into this, and you have gone out of your way to make it safer, but if the extension were to become malicious at a later date, expanding permissions (and relying on users brainlessly-clicking accept) or using an exploit or sidechannel would undo any of that.

The downside of browser extensions is that they are operating within a massive codebase, and thus have a huge attack surface if they decide to become malicious.

For what its worth, I commend your efforts here, its just near impossible to trust any peice of software not backed by the reputation of an established company/developer.


This is a privacy community. Half the posters here think their toaster is listening to their thoughts. Browser extensions are a serious and known vector for malware, installing one from a no-name developer and handing it your tfa codes is a high level of blind trust.


With all due respect, it doesnt matter what the code is right now. This is an extension that you can update at any point in the future to replace with something malicious.

Trust is near impossible to build in todays internet.

https://www.kaspersky.com.au/blog/dangerous-chrome-extensions-87-million/32170/

Note that a plugin’s malicious functionality can evolve over time in line with its owners’ goals. And the owners themselves may change: there have been cases when malicious features appeared in a previously safe extension after its creators sold the plugin to someone else.


It’s also an extension with 1 review, by a no-name developer, with only 12 installs… definitely would trust that…


It may be obscure, but that doesnt make it less of coincidence. Also, there is a pretty significant cross.over between tech people and car people (and a greater crossover with car owners).


Every day, millions of people discuss oil changes. If an article (was it an article or an ad?) is published on oil changes on X date, it is going to coincide with a large number of unlinked conversations. Today, it was you.

Once is a coincidence, if you can prove a pattern then you should concerned.


Easy then, buy a new one for you, give the old one to your friend :)

I wasnt really joking either, the upfront costs might be higher, but longer term will be cheaper than a cloud service. And hopefully more secure.


Buy another NAS and run it at a mates house? If your house burns down hopefully theirs is fine?


They are literally publically claiming that they have a zero day (or at least a zero day level capability). Google/Apple would be all over it trying to fix it. Cyber security researchers would be all over it as well.

NSA can get away with using 0 days for years because they keep quiet about them, and dont use them frivilously.


Oh, absolutely. Google/apple/MS definitely could do this. But some no-name company? Not really.


Yup, for sure, but while a nation state can risk exploitting a zero day to turn on your microphone, an ad tech company certainly can’t. As soon as it get patched they’d be ruined.


Almost every OS nowadays has some form of microphone detection right? So if this was on, you would be aware of it? And to jump ahead, even google is incentivised to prevent this company listening in, as they are direct competitor.

I wonder if this company is just trying to fleece advertisers with a made up tech? The “Claim your exclusive territory before your competitor” feels like the high pressure tactics that other scams use?

I might go disable the microphone in my TV remote anyway :/


The thief would have to unlock the phone to factory reset, and therefore could change the login password before factory reseting, so local account wouldnt be sufficient would it? (I am making some assumptions, i could be wrong)


There was a “quantum safe” encryption scheme proposed that had a non-quantum vulnerability found in it. Perhaps they are hedging against that occuring again? The scheme was rejected in the end so didnt matter to much.

https://arstechnica.com/information-technology/2022/08/sike-once-a-post-quantum-encryption-contender-is-koed-in-nist-smackdown/


Are you sure it wasn’t a phishing email? With stolen creds?


Yeah. But its hard if it’s not clearly a bug. Subtle bugs are easy to miss as features/by-design.


Honestly haven’t seen any bugs for signal, except for the group calls not ringing reliably, but that always has been an issue, so not beta specific