mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

646
comptes actifs

#webview

0 message0 participant0 message aujourd’hui
A répondu dans un fil de discussion

@ajsadauskas @JessTheUnstill @tomiahonen yes, and to add insult to injury #Mozilla didn't even wanted to sell people like @fuchsiii or me a #FirefoxOS device, with the only one being "launched" in the #EU being a #SimLock'd & #NetLock'd #prepaid phone in #Spain one could only attain in-store with all the "#KYC" nonsense they had, demanding a legal address in Spain back then.

And #nerds like myself are far from the "#consoomer #Normies" for whom stuff that isn't on shelves at Staturn/MediaMarkt, BestBuy, Walmart, ... doesn't exist. I'm used to importing #tech that I want!

A répondu dans un fil de discussion

@dgar
Many web developers still need to deal with Internet Explorer because its rotting undead corpse still lives on in the Windows WebView component used by countless applications to render html. The Chromium-based WebView2 is still far from fully deployed. #webview

Thanks to @hut23 for letting me present at #TheAlanTuringInstitute on Tuesday on the "Anatomy of a Browser" covering embedding browser frameworks.

A first for me: presented from my #Linux phone using an embedded #WebView streamed using ScreenCast.

View the slides online:

flypig.co.uk/presentations/tec

Slide/notes source/PDFs on GitHub:

github.com/llewelld/techtalk-g

Code for the WebView presentation app:

github.com/llewelld/harbour-pr

#Browser#Gecko#Blink

In *2019*, Alex Weinert of Microsoft wrote in techcommunity.microsoft.com/t5:

«
    MFA had failed.

    [...]
    All Authenticators Are Vulnerable
    [...]
»

Today, as echoed in bleepingcomputer.com/news/micr, Microsoft still insists that using weak MFA is a good idea.

In azure.microsoft.com/en-us/blog Microsoft writes (on August 15):

«
As recent research [1] by Microsoft shows that multifactor authentication (MFA) can block more than 99.2% of account compromise attacks, making it one of the most effective security measures available, today’s announcement brings us all one step closer toward a more secure future.
»

From that same article, "solutions" with (nearly as weak as SMS) "Microsoft Authenticator" is at the TOP of their list:

«
Organizations have multiple ways to enable their users to utilize MFA through Microsoft Entra:

• Microsoft Authenticator [...]
• FIDO2 security keys [...]
• Certificate-based authentication [...]
• Passkeys [...]
• Finally, and this is the least secure version of MFA, you can also use a SMS or voice approval [...]
»

From [1] (PDF) = query.prod.cms.rt.microsoft.co , no date of the "investigation period" to be seen *anywhere*, and one of the authors being Alex Weinert, more extreme percentages (approved by Microsoft's marketing dept):

«
Our findings reveal that MFA implementation offers outstanding protection, with over 99.99% of MFA-enabled accounts remaining secure during the investigation period. Moreover, MFA reduces the risk of compromise by 99.22% across the entire population and by 98.56% in cases of leaked credentials.
»

Dear reader: please stop buying Microsoft BS that completely ignores PhaaS.

To name a few examples:

🚨 "Experts agree [*] that setting up two-factor authentication (2FA) İs one of the most powerful ways to protect your account from getting hacked. However, hackers like COLDRIVER and COLDWASTREL may try to trick you into entering your second factor; we have seen attackers successfully compromise a victim who had enabled 2FA." - (PDF) accessnow.org/wp-content/uploa

[*] Not me. My tip is here: infosec.exchange/@ErikvanStrat

🚨 EvilGinx2: "Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication" - github.com/kgretzky/evilginx2 (there are more, like Modlishka, Muraena, CredSniper, EvilProxy (Phaas), NakedPages etc.)

🚨 Not even a fake website needed: bleepingcomputer.com/news/secu

🚨 From mrd0x.com/attacking-with-webvi:
«
Bypass 2FA
WebView2 also provides built-in functionality to extract cookies. This allows an attacker to extract cookies after the user authenticates into the legitimate website. This technique removes the need of having to spin up Evilginx2 or Modlishka but the obvious trade-off is that the user must execute the binary and authenticate.
»
In addition, from bleepingcomputer.com/news/secu:
«
"Yubikeys can't save you because you're authenticating to the REAL website not a phishing website."
mr.d0x
»
AND:
«
However, as mr.d0x admits and Microsoft pointed out in their response to our questions, this attack is a social engineering attack and requires a user to run a malicious executable.
»
Correct, but a local compromise does'nt protect you when you're using FIDO2 hardware keys or passkeys.

🚨 From 2022: microsoft.com/en-us/security/b:
«
A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA).
»

🚨 "Phishing with Cloudflare Workers: Transparent Phishing and HTML Smuggling" - netskope.com/blog/phishing-wit

🚨 "New EvilProxy Phishing Service Allowing Cybercriminals to Bypass 2-Factor Security" - thehackernews.com/2022/09/new-

🚨 From europol.europa.eu/media-press/:
«
The investigation uncovered at least 40 000 phishing domains linked to LabHost, which had some 10 000 users worldwide.
[...]
LabRat was designed to capture two-factor authentication codes and credentials, allowing the criminals to bypass enhanced security measures.
»

🚨 "Security and Privacy Failures in Popular 2FA Apps" by Gilsenan et al. (USENIX 2023): usenix.org/conference/usenixse
The PDF can also be found here: github.com/blues-lab/totp-app- (Aegis was one of the least problematic apps, and don't use Authy).

This is what is wrong with weak MFA/2FA:

You
 o
/|\  [device + browser]
/ \ |
v
[login.microsoftonline-aitm.com]
|
v
[login.microsoftonline.com]

(no thanks to DV-certificates).

TECHCOMMUNITY.MICROSOFT.COMAll your creds are belong to us!Multi-factor Authentication (MFA) matters. 
#AitM#MitM#EvilProxy
I know it is late :comfyslep: , but I am really excited to announce #melon 0.2.0.

Why 0.2.0 and not 0.1.4?
Well...

After spending way too much time trying to write a #webview bridge, I gave up and wrote a custom #gstreamer video player widget :ablobcatattentionreverse: .
And you know what is the best about it? It even has the same slide volume + brightness gestures that you are used to from #newpipe :ablobcatrainbow: .

The new player also makes these new features possible:
- Continue videos where you left of - because melon remembers your playback position :blobclipboard:
- Remember playback position when changing video resolution

And best of all:
Playlist support. Yes, you've heard correctly:
Just click the play button when viewing a playlist and listen to music - all day long. :blobcatheadphones: On repeat. Shuffle. Using autoplay.

https://codeberg.org/comcloudway/melon/releases/tag/0.2.0

I hope I didn't miss too many bugs :blobcatsipsweat:

#gtk #mobile #gstreamer

Google's Web Integrity API could disrupt third-party #YouTube apps on Android

From @alternativeto

Remember when it leaked that #Google would like to #DRM the web? Looks like they scrapped that particular idea (likely due to the backlash) but are looking to apply it to #Android (WebView Media Integrity API).

This is in addition to the attestation the Play Store already performs with installed apps... so, websites in webviews could also verify the "integrity" of Android devices.

#privacy #security #webview

alternativeto.net/news/2023/11

A répondu dans un fil de discussion

@gael @e_mydata No offense, but the hardware of the #MurenaOne is ancient and unsupported. Even though this is a flagship device for #Murena it is stuck with #Android12. There is no chance that anyone familiar with the #Android devices would recommend this device. And personally, I really wish you would take care of getting #WebView and Android updated on a regular basis first. Pretty much stopped recommending #eOS because it pretty much always lags behind in terms of security.