Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's a bit scary that a blog article that includes working proof-of-concept code is out there while the update has not even fully rolled out yet...

That's even worse than the Git commit.

> A better implementation of this kind of attack would be to look into how the renderer and browser processes communicate with each other and to directly simulate the relevant messages, but this shows that this kind of attack can be implemented with limited effort. While the democratization of two-factor authentication mitigates the dangers of password theft, the ability to stealthily navigate anywhere as that user is much more troubling, because it can allow an attacker to spoof the user’s identity on websites they’re already logged into.

Stealing the active sessions is bad enough already...



Yes, one would like to have both sandboxing and isolation.

https://twitter.com/alisaesage/status/915240006158921728




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: