All Apple Products are Vulnerable to New Password Stealing Hack

Sdílet
Vložit
  • čas přidán 19. 05. 2024
  • 👉 Free $100 Cloud Computing Credit
    seytonic.cc/linode
    0:00 iLeakage
    3:43 North Koreans Infiltrating US Companies
    5:54 Annoying New Flipper Zero Hack
    7:49 Google FAILS on Malvertising
    Sources:
    arstechnica.com/?p=1978389
    ileakage.com/
    www.bleepingcomputer.com/news...
    therecord.media/doj-seizure-w...
    www.justice.gov/opa/pr/justic...
    www.darkreading.com/careers-a...
    www.ic3.gov/Media/Y2023/PSA23...
    www.justice.gov/opa/pr/justic...
    techcrunch.com/2023/09/05/fli...
    techryptic.github.io/2023/09/...
    www.bleepingcomputer.com/news...
    / cyf5y2eta_v
    • Flipper Zero Apple iPh...
    lockup spam demo • Flipper Zero Apple iOS...
    www.mobile-hacker.com/2023/10...
    arstechnica.com/?p=1977141
    www.bleepingcomputer.com/news...
    www.malwarebytes.com/blog/thr...
    ===============================================
    My Website: www.seytonic.com/
    Follow me on TWTR: / seytonic
    Follow me on INSTA: / jhonti
    ===============================================
  • Zábava

Komentáře • 472

  • @collectorguy3919
    @collectorguy3919 Před 6 měsíci +107

    In 2023, advertisements are STILL a vector for malware. An ad-blocker is essential for security.

    • @Seytonic
      @Seytonic  Před 6 měsíci +16

      The FBI approves this message

    • @kenosabi
      @kenosabi Před 6 měsíci

      Google knocking your door in ..in 5 ..4...3...
      GIVE US THE AD REVENUE

    • @UKsystems
      @UKsystems Před 2 měsíci

      Reader has the one you use as some can contain malware

  • @benchy5769
    @benchy5769 Před 6 měsíci +86

    Google did things like this and they ask why people use ad blockers

  • @velociraptor5962
    @velociraptor5962 Před 6 měsíci +561

    Great... Just after I get my first iPhone in 10 years. 😂

    • @pootispiker2866
      @pootispiker2866 Před 6 měsíci +78

      What happens on your iPhone, stays on my iPhone

    • @jimmypatton4982
      @jimmypatton4982 Před 6 měsíci +36

      Just don’t visit malicious websites and don’t hang out with prankers.
      Though I would give the same advice to android users, so nothing new just annoying.

    • @jhonwickmex
      @jhonwickmex Před 6 měsíci +18

      Should have stayed with what you had

    • @-caio-
      @-caio- Před 6 měsíci +35

      Why tf would you get an iPhone after 10 years

    • @_Neopolitan
      @_Neopolitan Před 6 měsíci +29

      Your fault for going apple

  • @OcteractSG
    @OcteractSG Před 6 měsíci +274

    It’s close to a full year since the first news broke about malware in Google ads, and it’s for Free software again! At what point do we call this lack of action to fix the problem malicious on its own? I think now is a good time.

    • @SpaceshipOperations
      @SpaceshipOperations Před 6 měsíci

      >At what point do we call this lack of action to fix the problem malicious on its own
      It has been the case for decades. There are many verified leaked documents about how the NSA stalks, harasses and threatens software engineers (including, for example, those in committees responsible for shaping networking standards) in order to force them to make their software/standards vulnerable, so that governments can hack you whenever they want.

    • @notaplic8158
      @notaplic8158 Před 6 měsíci +18

      Malware ads have been around since pretty much the invention of Internet advertising

    • @smoothbraindetainer
      @smoothbraindetainer Před 6 měsíci +8

      Frauds and scams are the bread and butter of advertising. Ad pay is directly correlated to gullibility. Why do you think "adult content" pays so much...

    • @c1ph3rpunk
      @c1ph3rpunk Před 6 měsíci +1

      It’s been close to 2 decades since this concept has existed, deal with it.

    • @RadikAlice
      @RadikAlice Před 6 měsíci +4

      Man, I feel bad for you. Pretty much all replies are missing your point or dismissing it outright

  • @matteovalentino4890
    @matteovalentino4890 Před 6 měsíci +325

    To be fair, I read the paper, the practical application of such an exploit is incredibly difficult, it takes forever to steal strings, and it took years to a research team to obtain something, I'd say we good, majority of threat actors nowadays are kids that make DDos attacks or RaaS to make a quick buck

    • @inthefade
      @inthefade Před 6 měsíci +60

      Even if it is incredibly difficult, that is barely a hindrance to state actors; They have the best talent and infinite resources.

    • @prcvl
      @prcvl Před 6 měsíci +29

      perfect for country funded hacking teams

    • @varram3488
      @varram3488 Před 6 měsíci +2

      hahahhaha so true about the majority of the threat actors part

    • @MVPMTKING
      @MVPMTKING Před 6 měsíci

      ​@@inthefadeno such resource on earth is infinite, water, time, food, electricity, people.
      But they do have a helluva lot in terms of CySec.

    • @matteovalentino4890
      @matteovalentino4890 Před 6 měsíci +23

      @@inthefade I mean on that level let's be honest, state level threat actors probably have a huge supply of zero days and surely they don't need a year old exploit, let's remember that counties are the main customers of the NSO group

  • @klaudyw3
    @klaudyw3 Před 6 měsíci +74

    With regards to the keepass thing, the reason why that special K would get around that domain check might be quite simple - it boils down to how you deal with string comparisons. Different languages function differently, and I'm not going to pretend that i know what Google is doing, but here's what I think is going on. In a lot of cases you don't want to consider all the weird ways in which people might mess with text, so you get the option to ignore certain things when doing a string comparison.
    As a quick example, here's some Romanian letters: Aa Ăă Ââ. The first pair is just a normal A, but the other ones are slightly different. When you do a string comparison, you don't really want a strict comparison. Keyboards don't come with those letters out of the box, and most people will never even bother knowing how to type them (i copied them from Wikipedia). To deal with situations like this, you get a not so strict comparison going. In this case, my guess is that Google is using that not-so-string comparison when checking the domain name, leading to that issue.
    There's a lot of conference talks about text encoding, and they go into a bit of detail on how things work, how things are broken, and depending on what you look at how it can break things further. A lot of them are fun to watch, so if anyone's interested give it a search.

    • @SaHaRaSquad
      @SaHaRaSquad Před 6 měsíci +8

      Not to mention there are many letters/symbols which even look exactly identical but are actually different. For example A and А are not the same letter: the second one is from the cyrillic alphabet and looks different in binary.

    • @ivanv754
      @ivanv754 Před 6 měsíci +4

      So it’s like the tilde in Spanish. It’s supposed to be there but people don’t type it a lot of the time. You don’t want to tell Simón that Simon is not his name.
      Simon will be the name in his ID in fact, but his school diploma will say Simón.

    • @mastermach50
      @mastermach50 Před 6 měsíci +5

      Like matching Pokémon and Pokemon for easier searchability?

    • @williamchamberlain2263
      @williamchamberlain2263 Před 6 měsíci

      Is this the unicode thing again? That the visible glyph isn't the same as the encoding

    • @gershommaes902
      @gershommaes902 Před 6 měsíci

      A nice word you might be looking for is "homoglyph"

  • @tech1238
    @tech1238 Před 6 měsíci +112

    Apple have been battered with CVE’s in the last 1-2 months. Time have changed

    • @jimmypatton4982
      @jimmypatton4982 Před 6 měsíci +34

      iOS is probably the most common operating system if you look at single code stack.
      Android while having more phones has more code stacks and hardware stacks, so exploits can be limited in scope.

    • @redbakery8943
      @redbakery8943 Před 6 měsíci +18

      That's nothing new, they have been for years now. Look at the iOS security patch notes.

    • @tech1238
      @tech1238 Před 6 měsíci +1

      @@redbakery8943 Whilst that is true, If you look specifically at macOS, there has been a large amount of patch releases for macOS Monterey and Ventura, plus the additional Safari patches.

    • @somnia3423
      @somnia3423 Před 6 měsíci

      @@jimmypatton4982yeah android phones are much safer

    • @camelotenglishtuition6394
      @camelotenglishtuition6394 Před 6 měsíci +2

      1-2 years

  • @edsmith3052
    @edsmith3052 Před 6 měsíci +9

    Awesome video, I like that you’ve gone back to the multiple topic videos. It’s great to be able to watch one video and get an overview of important cybersecurity issues. As always, keep up the great work.

  • @skywizard3319
    @skywizard3319 Před 6 měsíci +4

    finally... i really need these videos to be more frequent, even if you're covering dumb things

  • @NeuroNinjaX
    @NeuroNinjaX Před 6 měsíci +2

    Let's wait until ChatGPT reads the paper... lol

    • @UKsystems
      @UKsystems Před 2 měsíci

      It refuses harmful tasks

  • @coolhandle572
    @coolhandle572 Před 6 měsíci +7

    The media is already blowing this out of proportion. I am already imagining all of the tiktoks people will make.

  • @Hasblock
    @Hasblock Před 6 měsíci +2

    Amazing video as always, Mr. Hedgehog

  • @shadyheadstash
    @shadyheadstash Před 6 měsíci +16

    I spent all morning learning about WGPU and WASM and then immediately learn WASM is being used for hacking, because of course it is.

    • @Oliver_Atkinson
      @Oliver_Atkinson Před 6 měsíci +9

      Tbf AFAIK all code gets used for hacking at some point

  • @luketurner314
    @luketurner314 Před 6 měsíci +1

    9:34 I find hilarious combined with CZcams's war on Ad Blockers

  • @khoanguyen0001
    @khoanguyen0001 Před 6 měsíci +10

    Good news: Lockdown Mode can mitigated this kind of Safari attack. 🎉

  • @skkskk
    @skkskk Před 6 měsíci +3

    Dude I love your video.its amazing

  • @twistedsaltypretzel7727
    @twistedsaltypretzel7727 Před 6 měsíci +38

    To be fair, a router with "Free Apple WiFi" would allegedly net a shitload of apple ID creds :/

  • @mythicXD
    @mythicXD Před 6 měsíci +67

    I wonder if anyone with an amplified Bluetooth signal would sit near Apple HQ till they fix the bug?

    • @U20E0
      @U20E0 Před 6 měsíci +4

      it's not really fixable

    • @MelaninMagdalene
      @MelaninMagdalene Před 6 měsíci +3

      @@U20E0
      What’s the reason for that?

    • @U20E0
      @U20E0 Před 6 měsíci +1

      @@MelaninMagdalene This exploit via WebKit may possibly be fixed, but the underlying bug is in the hardware.

    • @stayblueee
      @stayblueee Před 6 měsíci +4

      @@SpookySkeleton738 the original comment was not about the speculative execution part of the video

    • @SpookySkeleton738
      @SpookySkeleton738 Před 6 měsíci

      @@stayblueee 💀

  • @dil736
    @dil736 Před 6 měsíci +3

    Google owns CZcams? CZcams doesn't want me to use an ad blocker lol.

  • @auto117666
    @auto117666 Před 6 měsíci +5

    3:19 I can hear people in the reversing community say, “challenge accepted”

  • @GrishTech
    @GrishTech Před 6 měsíci +5

    Another good reason to never allow auto password fill by password manager s. On my ios device, I specifically have to press a login for it to be autofilled.

  • @dsfs17987
    @dsfs17987 Před 6 měsíci

    Cyrillic lettering on the flipper case, why am I not surprised... 😂

  • @FellowGEEK-mi4tw
    @FellowGEEK-mi4tw Před 6 měsíci +2

    Looks like there is a fix inplace for iLeakage at least on my MacOS the feature flag for "Swap Processes on Cross-Site Window Open" was enabled for me. now checking if iOS Safari has this

    • @FellowGEEK-mi4tw
      @FellowGEEK-mi4tw Před 6 měsíci +2

      Yep enabled in iOS too, so they fixed this when?

  • @pauplus
    @pauplus Před 6 měsíci +1

    This sounds similar to the Intel skylake flaws where threats could only be largely mitigated with a hefty performance penalty. This should be fun to watch play out.

  • @bazzeil
    @bazzeil Před 6 měsíci +2

    We tried the ddos bluetooth attach at work, it doesnt seem to work against samsung devices, and only the HP laptop in the office got the notifications. The Apple branded devices were hosed by this.

  • @brainstem2023
    @brainstem2023 Před 6 měsíci +10

    Duh, don't use a tab that YOU didn't open YOURSELF - either by using a saved bookmark or typing the URL. The only exception is if your browser is set up to open previously open tabs or certain tabs at startup. Popups are NEVER to be trusted unless it's spawned by the website you are using; for example, you click sign-in on your bank's page and a popup opens. That's pretty much internet safety 101. The weak link in internet security is almost ALWAYS the loose nut behind the keyboard.

    • @mgord9518
      @mgord9518 Před 6 měsíci +5

      The pop up is spawned by the website you're using... the attack looks exactly like OAuth, which is required to sign into tons of legitimate websites and your password is never supposed to be readable from it, which is the security vulnerability that's being talked about.

    • @SirFancy
      @SirFancy Před 6 měsíci

      I cannot believe Apple is being defended already. It is not "internet safety 101" to not trust a website that has the green lock icon, is HTTPS, you've verified certs for, and has the correct URL. It is not uncommon for a site to open a popup to complete OAuth. This is Apple's fault, plain and simple. Under no circumstances should another tab have access to the contents of another when the site is completely different and not under their control. By design, this is supposed to be impossible with how the WWW operates, and it should be fixed by Apple, and not just be a "well now this is how it is so be more cafeful". If this is how it is now, then literally nothing can be trusted. So yeah. Apple needs to fix, end of story.
      Source: CASP+ certified

    • @DanielQwerty
      @DanielQwerty Před 6 měsíci

      Ever used sign in with google?

    • @OGNord
      @OGNord Před 6 měsíci +1

      @@DanielQwertynot even remotely the same thing

    • @samando524
      @samando524 Před 6 měsíci +2

      @@OGNord To the average person who has no idea about internet security it would sure seem like it.

  • @chriswaldrip2739
    @chriswaldrip2739 Před 6 měsíci +3

    It's been a year without a patch, doesn't mean Apple isn't working on a fix. As pointed out it's a CPU issue so they're probably working on a balanced solution that doesn't completely eliminate the benefits of speculative execution but still try and mitigate the exploit. 🤔

  • @btarg1
    @btarg1 Před 6 měsíci +1

    That annoying flipper zero packet looks like it would be hilarious to use against people in public

  • @officialunderfire
    @officialunderfire Před 6 měsíci

    Wow. Never thought I’d be effected by malware but yup... I fell for it. 😢

  • @redslashed
    @redslashed Před 6 měsíci

    Yo I spotted the flipper zero thing in the wild😂

  • @CZghost
    @CZghost Před 6 měsíci +8

    Speaking of "understanding research papers" - most people will simply discard it as too long to read. But don't underestimate those who are determined. Determination is a powerful drive, and while it may take a longer time (a bit risky as it may be patched during this time), somebody might as well be able to piece it all together and start exploiting it.

  • @Biggerman159
    @Biggerman159 Před 6 měsíci +2

    YESSS THE WEEK WEB IS BACK

  • @AWriterWandering
    @AWriterWandering Před 6 měsíci +5

    This is why we can’t have nice things

  • @H0mework
    @H0mework Před 6 měsíci +3

    I remember the spectre and meltdown Intel 'bug'. I disabled the patch and my computer felt like I upgraded.

    • @mollthecoder
      @mollthecoder Před 6 měsíci +3

      And now a script kiddie can have full access to your computer memory

    • @fordprefect859
      @fordprefect859 Před 6 měsíci +1

      that is a bad idea. Modern CPUs are actually optimized to run those patches, and the security implications of turning them off are.... apocalyptic.

    • @tezcanaslan2877
      @tezcanaslan2877 Před 6 měsíci

      I would only recommend doing this in aging systems with no critical data as you have just left your probably critical computer open to pretty much all remote attacks
      Turn that on or refrain from angering anybody on the internet.

    • @TheOfficialOriginalChad
      @TheOfficialOriginalChad Před 6 měsíci

      @@mollthecoderyou clearly haven’t read the PoCs for them 😂

    • @mollthecoder
      @mollthecoder Před 6 měsíci

      @@TheOfficialOriginalChad I have, what are you referring to in particular?

  • @huddunlap3999
    @huddunlap3999 Před 6 měsíci

    This is why I subscribe.

  • @UnderSquare
    @UnderSquare Před 6 měsíci

    He had his coffee right before recording "Hello World"

  • @n-i-n-o
    @n-i-n-o Před 6 měsíci

    love yor channel.

  • @asdprogram
    @asdprogram Před 6 měsíci +15

    intel used to struggle with the same vulnerability, but they appearantly fixed it and it appearantly doesnt really cost measurable cpu performance. I tested it

    • @aronm5329
      @aronm5329 Před 6 měsíci +9

      New cpu are built against meltdown so it's not an issue anymore. The update windows did in 2018 did lower CPUs vulnerable performance by a measurable amount however. Most people might not tell, but it wasn't insignificant

    • @asdprogram
      @asdprogram Před 6 měsíci +1

      @@aronm5329 I haven't seen any performance difference with my haswell cpu with or without spectre and meltdown mitigation.

  • @QuantariousBitsoniTalvanen
    @QuantariousBitsoniTalvanen Před 6 měsíci +1

    Finally, I can tell everyone who swears by the security of apple's products that they can suck it. At least till they find a patch.

  • @mo4503
    @mo4503 Před 6 měsíci +2

    This hack is not new. This has been around since 2017 or 2018. It was found on Intel CPU’s. It is the same method though. The CPU does what it think you’re about to do before you do it by your habits. It memorizes your habits over time and try’s to save small amounts of time for you.

  • @programateiro9507
    @programateiro9507 Před 6 měsíci +2

    1:23 - I didn't knew `speculative execution` was a thing and CPUs jumped into the if statement just to later evaluate it's value: this is massive security issue imho

    • @azizifmy5360
      @azizifmy5360 Před 6 měsíci +1

      Just another name for prefetching, it is originally employed to improve cpu performance, security wasnt really a big thing back then.

  • @MorningStarChrist
    @MorningStarChrist Před 6 měsíci +1

    I find it baffling that apple has its own specter vulnerability.

  • @johanlugthart7782
    @johanlugthart7782 Před 6 měsíci +4

    Looks like I am save with my iPhone 8.😅

  • @ardwetha
    @ardwetha Před 6 měsíci +1

    Why does this exploit with apple kinda sounds like specter. Both exploit the specular execution and then read data from memory, even though the languages normally don't have features for this.

  • @Nas_Allie
    @Nas_Allie Před 6 měsíci

    Ironic, cannot even open CZcams with ad blocker installed but ads turn on

  • @InsideOfMyOwnMind
    @InsideOfMyOwnMind Před 6 měsíci

    Interesting that the FBI recommends using an ad blocker while youtube is at all out war with ad blockers.

  • @frog6790
    @frog6790 Před 6 měsíci

    the flipper zero thing sends a packet that is the same as the apple tv packet with the last few characters randomized

  • @Krzys_D
    @Krzys_D Před 6 měsíci +1

    My work only uses Apple cause the owner and IT guy says that Apple has no vulnerabilities 😅 glad I'm the only one on PC

  • @reoccurcat
    @reoccurcat Před 6 měsíci +1

    Someone literally used that Bluetooth attack on me today and crashed my phone too

  • @ifur
    @ifur Před 6 měsíci +6

    Bye bye iCloud Keychain?

    • @jimmypatton4982
      @jimmypatton4982 Před 6 měsíci

      It doesn’t matter if keychain or manually typing. As far as I could tell they are putting in long to execute statement to have as much data pre-gussed generated. Grabbing the data and then repeating if possible or just giving up.
      I think what matters is adding code to prevent the exploit from leaking one source of data to previous site.

  • @bsdims
    @bsdims Před 6 měsíci +2

    Shoutouts to cars where their stereo/speaker system only accepts Bluetooth pairing, no headphone cable for you, pisses me off. I can't wait for modern-day manufacturers to regret that choice due to Flipper0 nonsense & general security holes. Never liked Bluetooth, both as a consumer (pairing annoyances, battery-life to deal with, etc.) & as a security-minded fella. The only way you can disrupt wires is by wear & tear, and/or the chord being cut in two. AUX4Life, & oh yeah, same goes for modern smartphones too, courage my ass.

  • @free4fire
    @free4fire Před 6 měsíci +8

    Bu...but Apple products can't be hacked or get viruses, the cool hip guy in the commercial said so, only those PC nerds can get those! XD

  • @justinolsen488
    @justinolsen488 Před 6 měsíci

    9:12 Microsoft edge also has that!

  • @iamagi
    @iamagi Před 6 měsíci +1

    The need to reverse the decision to allow other characters than a-z

  • @Sound_.-Safari
    @Sound_.-Safari Před 6 měsíci +2

    Pegasus like 🤤

  • @alejandroalzatesanchez
    @alejandroalzatesanchez Před 6 měsíci +1

    kinda ironic that the example password is: thinkdifferent

  • @imbrettk9381
    @imbrettk9381 Před 6 měsíci

    Oh no

  • @Andreasepicgamingr
    @Andreasepicgamingr Před 6 měsíci +1

    Wait so intel based macs are safe?

  • @letsmakethis
    @letsmakethis Před 6 měsíci +7

    I'll wait to see what the Security Now guy has to say about this on Tuesday before I get too concerned. There have been a stream of "sky is falling" stories about Apple vulnerabilities lately, but when you get a report from someone who actually read and understands what the researchers found, you typically find that you have to be a target of a nation state to worry about it and/or it's easily blocked.
    This would also be the first time in 6 years that a Spectre/Meltdown-type of vulnerability had an impact on anything other than a web server.

  • @julvialinares1395
    @julvialinares1395 Před 6 měsíci

    Is the ileakage only works for Apple or third party password managers. Since they didn’t mention passkeys. Reply if it also works for passkeys. Because this is new to me.

    • @sarae9302
      @sarae9302 Před 6 měsíci

      iLeakage allows you to access any data that's present on the page you opened. Passkeys are not susceptible to being stolen this way because the website first needs to send you an authentication request and your browser responds to that requests. The response, even if intercepted, can't be replayed in the future. However, any resulting authentication tokens (bearer tokens, cookies, etc) can be stolen which could grant the attacker access to your account.

  • @aussiemadlad
    @aussiemadlad Před 6 měsíci +2

    DAMN. i gotta warn my mum

    • @feuerherz007
      @feuerherz007 Před 6 měsíci +3

      don't worry, i told her already

  • @atirutwattanamongkol8806
    @atirutwattanamongkol8806 Před 6 měsíci +21

    How on Earth can JS access something that low-level?????

    • @LetrixAR
      @LetrixAR Před 6 měsíci +6

      It doesn't. WASM was used.

    • @atirutwattanamongkol8806
      @atirutwattanamongkol8806 Před 6 měsíci +3

      @@LetrixAR WASM is a simulated stack machine in a nutshell, so there should still be no way for it to access something so low-level.

    • @GizziXZ
      @GizziXZ Před 6 měsíci

      ​@@atirutwattanamongkol8806What's WASM?

    • @TMinusRecords
      @TMinusRecords Před 6 měsíci

      It's a timing based attack

    • @samando524
      @samando524 Před 6 měsíci

      @@atirutwattanamongkol8806 If you watch the video it includes an explanation. Hope this helps :)

  • @rafaelestevam
    @rafaelestevam Před 6 měsíci

    8:30 Ohhhh I rub the screen 😅

  • @christopherg2347
    @christopherg2347 Před 6 měsíci

    Speculative execution is starting to be a seriously challenger to buffer over- and underflows as "the most common security vulnerability".

  • @prophoenix212
    @prophoenix212 Před 6 měsíci +12

    Isnt it similar to spectre attack on intel cpus?
    Also for android fans, you can steal data much easier from android and you don’t need those exploits.. 2:05

    • @lbgstzockt8493
      @lbgstzockt8493 Před 6 měsíci

      Sure sounds like it, which is probably why there is no fix for it yet. Didn’t the spectre fix cause a performance drop in some cases?

    • @dealloc
      @dealloc Před 6 měsíci +5

      Yes. In fact I think it would fall under Spectre (also noted by the iLeakage paper) which affected all major CPUs; Intel, AMD and ARM.
      However, it also seems Safari is a big piece in this in how it apparently shares some memory between tabs when it shouldn't-both Chrome and Safari employs tab isolation, where each tab is assigned its own process-but it seems Safari may still leak some memory, or it could be the OS as well, given that processes should never be able to share resources as they should be in their own memory space.

    • @mgord9518
      @mgord9518 Před 6 měsíci +1

      If it's so easy then how do you do it?

    • @LetrixAR
      @LetrixAR Před 6 měsíci +1

      ​@dealloc but this seems to be tied to webkit. How does a rendering technology affects a policy of tab isolation?

    • @dealloc
      @dealloc Před 6 měsíci

      ​@@LetrixAR
      Was it exploited on other WebKit-based browsers that didn't use tab isolation? So far I've only seen reports on Safari specifically (on macOS).
      On iOS you can't use WebKit directly,. You use a wrapper API like UIWebView (or rather, the newer WKWebView).
      It's also not possible for browsers on iOS to spin up additional processes So these restrictions could make it possible for browsers on iOS to be affected by this too due to these limitations.

  • @ong1
    @ong1 Před 6 měsíci +1

    0:13 I misheard Malaysia's😅

  • @kumalalalalalalaa7045
    @kumalalalalalalaa7045 Před 6 měsíci

    Thanks im gonna use this lol

  • @IDontModWTFz
    @IDontModWTFz Před 6 měsíci +1

    How unfortunate

    • @LeonSteelpaw
      @LeonSteelpaw Před 6 měsíci

      Uh-oh!
      How Unfortunate!
      I'm going to do a sneaky thing, and throw a new contender into the ring!
      *A New Challenger Has Appeared!*

  • @aliabdallah102
    @aliabdallah102 Před 6 měsíci +1

    Didn't intel have to deal w this stuff back i 15?

  • @tsukipuppy
    @tsukipuppy Před 6 měsíci

    I recently purchased a MacBook then saw this video 😂

  • @PartlyXenon
    @PartlyXenon Před 6 měsíci +1

    I guess I'm never getting berated again for disabling JavaScript..

  • @AlanTheBeast100
    @AlanTheBeast100 Před 6 měsíci

    A graduate of Clickbait Academy.

  • @anon_y_mousse
    @anon_y_mousse Před 6 měsíci

    The broken URL garbage situation is why only ASCII text should be allowed in URL's and it should be stringently checked by *everyone*, especially the browser. It's not that hard to run through a 64k character string once to check that each character falls within a given range by simply using a table based approach. You can do direct calculation on the accepted range and use SIMD to parallelize it if you really feel it's necessary even though it'll only be checked when changing addresses. Oh well, I'm still hoping that HTML/CSS/JS get erased and replaced.

    • @stevebabiak6997
      @stevebabiak6997 Před 6 měsíci +1

      This is tricky, but it looked like the actual URL was all ASCII, but the address bar interpreted the Unicode characters and displayed those characters rather than the straight ASCII. The browsers should stop doing that with any URL and problem would be gone.

    • @anon_y_mousse
      @anon_y_mousse Před 6 měsíci

      @@stevebabiak6997 Do you know what ASCII is? The character in question which was shown in the video was ķ. It's described as "Latin small letter K with cedilla" with the code U+0137, UTF-8 0xC4 0xB7. That is most decidedly outside the range of ASCII characters.

  • @GhostFox_69
    @GhostFox_69 Před 6 měsíci

    Imagine being dumb enough to enable autofill 🤣🤣🤣
    Dude I am so paranoid that I don’t even let my browser open new tabs. I’ll just start a new session and type in the address myself.

  • @maka6000
    @maka6000 Před 6 měsíci

    So, a workaround is to use Firefox?

    • @LetrixAR
      @LetrixAR Před 6 měsíci

      No Safari on macOS and no browser in iOS.

  • @WiluckGD
    @WiluckGD Před 6 měsíci +1

    Ok I’m screwed then

  • @Irwin.009
    @Irwin.009 Před 6 měsíci

    Bowser is taking over

  • @rimilien
    @rimilien Před 6 měsíci

    So the exploit relies on java?

  • @ghost_ship_supreme
    @ghost_ship_supreme Před 6 měsíci

    Great… so it’s just a matter of time

  • @illsmackudown
    @illsmackudown Před 6 měsíci

    "even if filled in by a password manager"
    holy brainwashing

  • @Abdullah97484
    @Abdullah97484 Před 6 měsíci

    Gheez that sussy K

  • @MelaninMagdalene
    @MelaninMagdalene Před 6 měsíci

    North Korea really pulled itself up by the bootstraps

  • @1.4142
    @1.4142 Před 6 měsíci

    FBI recommending adblock? take that youtube.

  • @ThunderbotGamez
    @ThunderbotGamez Před 6 měsíci +1

    Send to apple now

  • @kitterbug
    @kitterbug Před 6 měsíci

    droid gang how you feeling

  • @robeagleR
    @robeagleR Před 6 měsíci +1

    Okay so I’ll just blacklist it from my router. 🎉

  • @realgalactic
    @realgalactic Před 6 měsíci +1

    Hi!

  • @FusionDeveloper
    @FusionDeveloper Před 6 měsíci

    Ad blockers, aka, scam blockers.

  • @Australia_QLD
    @Australia_QLD Před 6 měsíci

    so just turn off auto fill and watch for redirects?...

  • @bestaimy
    @bestaimy Před 6 měsíci +1

    wow

  • @BPTtech
    @BPTtech Před 6 měsíci +1

    Linode got bought by Akamai?

    • @Get_yotted
      @Get_yotted Před 6 měsíci +1

      You didn’t know, it’s been a while already

  • @sockraltiltemper5402
    @sockraltiltemper5402 Před 6 měsíci

    I leakage lol that's great

  • @xproot0
    @xproot0 Před 6 měsíci +1

    Spectre for Apple wtf

  • @janmillerty4528
    @janmillerty4528 Před 6 měsíci

    Cool

  • @everypizza
    @everypizza Před 6 měsíci

    All devices have an exploit for passwords bt design: Looking at someone typing.

  • @ninjanerdstudent6937
    @ninjanerdstudent6937 Před 6 měsíci +1

    I'm glad I never use Safari.

  • @JuniorSantiago3x
    @JuniorSantiago3x Před 6 měsíci

    you lost me at “it uses Javascript”
    😂😂😂
    under that same context, all devices are always vulnerable when a dumb user click a link

  • @Jaxx7594
    @Jaxx7594 Před 6 měsíci +1

    Techryptic isn't the guy who found the bluetooth DoS. He stole the work of the Flipper Zero Xtreme dev team. Please, credit the right people. If you wan't, I could link you a blog post from the Xtreme team proving it all

  • @kenosabi
    @kenosabi Před 6 měsíci

    If all the NK money is sent back for missiles...shouldn't they have a way larger arms program by now..?

  • @arili-eo7vw
    @arili-eo7vw Před 6 měsíci

    420 000 sub special?