himazawa

joined 2 years ago
[–] himazawa@infosec.pub 1 points 2 years ago* (last edited 2 years ago)

Ahaha I had this exact same experience. Locked out because bitwarden didn’t get the code correctly. “Luckily” the jwt token never expires so I was able to log back in without the 2FA.

[–] himazawa@infosec.pub 2 points 2 years ago

I was thinking about that just today, I have something like 30+ services running on a single compose file and maintenance is slowly becoming hard. Probably moving to multiple compose file.

[–] himazawa@infosec.pub 5 points 2 years ago (8 children)

Thanks. I have never seen the last thing, what the numbers indicates?

[–] himazawa@infosec.pub 9 points 2 years ago (15 children)

What am I looking at?

[–] himazawa@infosec.pub 1 points 2 years ago (3 children)

I use the Inbox-Zero method

https://youtu.be/al1QXFQjq1s

So far no issues.

[–] himazawa@infosec.pub 9 points 2 years ago (4 children)

Soon, people will join the strange and buggy world of YouTube alternative frontends

[–] himazawa@infosec.pub 1 points 2 years ago

Because I wanted to try if others URI schemas were supported instead of http / https. file:// was a valid one. Don't worry, the day an attempt of data exfil will happen, you will not see it though your console logs.

[–] himazawa@infosec.pub 12 points 2 years ago* (last edited 2 years ago) (2 children)

Is this, by any chance, originated from the sub called ignore me? In that case is probably my bad because is set as the image of the channel. I was playing with lemmy in the previous version and forgot about it, sorry.

It will not work since your browser can't access local file that easily without breaking the sandbox :) also the that alert appears because your browser is trying to load an image with that path, nothing dangerous or remotely exploitable, don't worry.

Edit: I removed it so you shouldn't see the alert anymore.

P.S. not, it's not trying to steal anything, it's your browser trying to load that file as an image but instead of being let's say this url: https://beehaw.org/pictrs/image/c0e83ceb-b7e5-41b4-9b76-bfd152dd8d00.png (this sub icon) , it's this one file:///etc/passwd so you browser is doing the request to your own file. Don't worry, nothing got compromised.

/cc @shellsharks@infosec.pub> BE

[–] himazawa@infosec.pub 2 points 2 years ago (1 children)

Why Russia thinks they cooperated with Apple when the agencies can just buy 0days from the resellers?

[–] himazawa@infosec.pub 6 points 2 years ago (2 children)

Especially Adblock 😵

view more: ‹ prev next ›