Post AxADsreZOMAnRVj8Qi by [email protected] | |
More posts by [email protected] | |
Post #AxA3zIXVLOE11YqqVE by [email protected] | |
0 likes, 1 repeats | |
Do you guys consider anything that relies on the #browser to be compromised as … | |
Post #AxA4Gs8MG3lkLDT9dY by [email protected] | |
0 likes, 1 repeats | |
@pft "In order to conduct an attack, a threat actor needs to convince the … | |
Post #AxA4emG3kuVZ4GTEOW by [email protected] | |
0 likes, 1 repeats | |
@reynardsec "our grand theft strategy requires the back clerk to unlock th… | |
Post #AxA516def5jMeE9cJs by [email protected] | |
0 likes, 1 repeats | |
@pft yeap, or: it is possible to get RCE on the server... assuming the bad acto… | |
Post #AxADsrXpnOml6cZkvo by [email protected] | |
0 likes, 0 repeats | |
@pft a malicious extension could just steal your session cookies, which seems m… | |
Post #AxADsreZOMAnRVj8Qi by [email protected] | |
0 likes, 1 repeats | |
@iMeddles isn't this exactly how extension-based passkey managers work? If … | |
Post #AxAzOzIxAwG2HkR4Ii by [email protected] | |
0 likes, 0 repeats | |
@pft yeah, this bugged me too as soon as I saw it. A better headline would read… | |
Post #AxAzOzQ2kZvedjkjLs by [email protected] | |
0 likes, 1 repeats | |
@iinuwa that's a very good point! |