Skip to main content
replaced http://stackoverflow.com/ with https://stackoverflow.com/
Source Link

There are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsall external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

There are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

There are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

replaced http://meta.stackoverflow.com/ with https://meta.stackoverflow.com/
Source Link

There are several problems with this feature. For example, long running scriptslong running scripts and infinitely long running scriptsinfinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandboxmy post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's postJohn's post, bfrohs' postbfrohs' post or nhinkle's postnhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

There are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

There are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

added 296 characters in body
Source Link
Pacerier
  • 90.4k
  • 2
  • 18
  • 14

WhileThere are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

While this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

There are several problems with this feature. For example, long running scripts and infinitely long running scripts which will hang / crash the browser.

But more importantly, while this feature might be secure for Stackoverflow's servers, it is definitely unsecure for Stackoverflow's users unless we can solve the phishing problem as demonstrated by my post on snippet sandbox which requires nothing but the innocuous window.location.href.

(A phishing demonstration is not a technological demonstration but a social engineering one. As such, if the demonstration is worded like John's post, bfrohs' post or nhinkle's post, it doesn't demonstrate the dangers of a phishing attack.)

While there are certainly users who may spot these in-domain phishing attacks and flag them for removal, it might indeed be already too late.

Phishers can get extremely creative, but I suppose all in-domain phishing attacks can be prevented by disallowing all external redirections —window.open, window.location, a href, etc— and all external embedsiframe src, frame src, script src, img src, object, embed, and CSS / favicon's link href, etc—.

added 82 characters in body
Source Link
Pacerier
  • 90.4k
  • 2
  • 18
  • 14
Loading
added 55 characters in body
Source Link
Pacerier
  • 90.4k
  • 2
  • 18
  • 14
Loading
Source Link
Pacerier
  • 90.4k
  • 2
  • 18
  • 14
Loading