

If it’s that good, it’s worth spending some time contemplating.


If it’s that good, it’s worth spending some time contemplating.


troyandabedinthemodem
Yeah, at this point Cloudflare should just trademark network outages.


Oh, it’s not, the difference is that the SVG is an unexpected delivery vector.
The script on a website might change over time, might be blocked by an extension like uBlock origin that prevents sections of web code from loading in the first place. You can block a website’s JS with an extension that specifically does that, like jshelter. A malicious SVG is static, the malicious code is malicious forever and is embedded in the file. A browser extension can’t selectively block pieces of the file from loading.
Script blocking extensions prevent web page code from loading, but they don’t prevent the application from executing JS. If you open an SVG, the file is downloaded locally (it’s not web code) and the JS in the file will execute locally, with the same permissions and file system access as the user opening the file.


Yup.
There’s always value in understanding risk, and in limiting it.


the security risks associated with JavaScript are not typically seen as significant since your filesystem is not accessible and most any other vulnerable data isn’t either for that matter
go on mate, pull the other one!
Rowhammer is unfixable, by the way, until someone invents a replacement for DRAM.


Yes, actually I use jshelter to block script and selectively allow it per website.


YSK: SVG files are a security risk. Be careful where you get them from and how you handle them.
Basically, an SVG can contain JavaScript. If you open an SVG in an application that can interpret the JS (e.g. a web browser) then the script will execute (just as with a malicious PDF), at which point it could download other files (malware) or perform any other function that the application has access to (creating, editing or deleting files on the hard drive) because you gave it permission to do that by opening the SVG. Effectively opening an SVG in a JS-capable application is the same as allowing a stranger to run arbitrary code on your computer. You might as well go around the Internet wearing a “please hack me” sign.
Downloading an SVG to your hard drive directly should be relatively safe, and opening it in a graphics program that does not execute JavaScript should have no risk, but viewing random SVGs in a web browser is a real hazard.


You’re right, there’s a lot more delusional people with money riding on this line going up.
Seriously, fuck Pearson. Garbage company.


Are we literally at the “Thank me for abusing you” stage?
Wow.


“Why don’t people like our user surveillance systems? they’re so impressively good at invading your privacy!”


Yes, that’s correct, crime should not pay.


He’s on third.


Maybe?


Yes.


well… fuck.


Gotta get those AI-generated pupils back in the classroom.
Will there be an AI truancy officer?
Carol of the Bells - Trans-Siberian Orchestra