Jump to content

Sampei.Nihira

Member
  • Posts

    1,270
  • Joined

  • Last visited

  • Days Won

    30
  • Donations

    0.00 USD 
  • Country

    Italy

Everything posted by Sampei.Nihira

  1. Interesting work,I had never read it. Consider, however, that theoretically Shors' algorithm: https://en.wikipedia.org/wiki/Shor's_algorithm might be able,using a Quantum Computer (such as Google's) to break the 25519 elliptic key implemented in TLS 1.3: https://en.wikipedia.org/wiki/Curve25519 Although my personal motivation related to confidentiality seems excessive,in my browser I use a Post Quantum Secure Key. It is also possible to verify the key used at the BrowserLeaks website. But an easier test is also available.
  2. With the link you have the possibility to choose a website with many trackers suitable for your OS. But I understand that it is not of your interest. Have a nice day. Example in the image below:
  3. @AstroSkipper If you want to check the performance of UBO Legacy it may be a good idea to check the blocks obtained against UBO on a website with many trackers: https://whotracks.me/ I believe that it will not be easy to achieve a reliable result.
  4. In my post I didn't write how to block third-party cookies. I wrote that I blocked that flag (therefore that feature that I don't like being enabled without my consent) which is already disabled by default.
  5. The developers now call it 3PCD. In Edge the flag is this: Test Third Party Cookie Phaseout I blocked*** it even though by default it is disabled..... ***= I guess you know how to do that.....
  6. Hi to all. There is no reason to keep third-party cookies enabled. But there is also this possibility: https://www.ghacks.net/2024/01/05/how-to-enable-chromes-tracking-protection-right-now/
  7. With Windows we have lost the power of the scribes of ancient Egypt. Without the movie I would probably have been a lousy doctor or a bored banker. Maybe I would have had more fun.
  8. @XPerceniol This: https://en.wikipedia.org/wiki/WarGames was the film that determined my work. I was 20 years old. Windows 95 was probably Microsoft's first Operating System that brought home users closer to computers. It was simple and intuitive. But with MS-DOS we were like modern scribes.
  9. @XPerceniol Indeed. A proper testing methodology would be to check Tor's "trust score" and then check your browser. If your browser is close to Tor's score, it is better.
  10. @dmiranda Hi,a few years ago,we studied the fingerprinting of many websites. Usually most websites use few fingeprinting techniques. And almost all of them for one purpose,the commercial purpose. Instead in my opinion,the most dangerous fingerprinting is the one related to security. There is an abysmal difference with websites where you can perform these tests. If you want to "go crazy" I will provide you with a testing website used by Brave engineers. According to them the best fingerprinting website. Although I believe that the website does not provide an important benchmark,thus a correct conclusion. It is the trust score. According to Brave engineers it would be best with a percentage equal to 0. This, on the other hand, is Abrahamjuliot's somewhat equivocal opinion: https://abrahamjuliot.github.io/creepjs/
  11. The response is that there is in the extension a probable bug. I hope that by the middle of the year 2024, the AdGuard team will address these 20 open issues.
  12. @XPerceniol *** Canvas test *** I get the same result in Edge. For me it is more than enough.
  13. @D.Draker My extensions: And Canvas is not the most important test.
  14. Guys,consider that I was (today I am retired) an IT security. The only method to achieve non-uniqueness is to use an extension called JShelter and (perhaps) have it in the browser (WebGL + WebRTC by default). But I very much doubt this result. I would not recommend those using a Firefox-based browser to use JShelter. Those using Arkenfox.js directions will never arrive at a result of NOT uniqueness in that test. I believe that even in Chromium-based browsers it is better to follow the directions of Arkenfox.js. And use only uBlock Origin and no other privacy-specific extensions. P.S. In my opinion, therefore, these tests are more valid: https://browserleaks.com/ I am quite happy with the results obtained with my Edge. Just 2 examples:
  15. I can give you lists of filters that I use in Edge: consider that I use at the Next DNS level also: EasyPrivacy OISD full You'll notice that I don't use anti-malware/phishing filter lists because this task is left to other areas of my security configuration. Kees1958's filter list (last in the custom lists) is not good for MyPal68,you will find other alternatives at the link below: https://github.com/Kees1958/W3C_annual_most_used_survey_blocklist I hope it's helpful to you.
  16. The problem would not be the EPSS percentage of the individual vulnerability being examined: https://www.cvedetails.com/vulnerability-list/assigner-70/chrome-cve-admin-google.com.html For forum members using unpatched versions of Chrome, the bigger problem is the accumulated summed vulnerabilities. That bring the EPSS to significant values. Considering an Anti-Exploit defensive line is certainly beneficial.
  17. I can’t write a custom rule to block WebRTC in Adguard MV3. I opened a problem that was assigned to an engineer (woman ) AdGuard. I have no problem with ublock Origin.
  18. @D.Draker It doesn’t seem to be. The EPSS (Exploit prediction scoring system) probability that the vulnerability will be exploited in the next 30 days was for Webp=0.15%. For this new exploit the EPSS=0.11%. So little difference. Not scary the first and almost irrelevant the second.
  19. You’re right. I just thought I’d let you know. I won’t bother you with that again. Excuse me. But I won’t start another thread because the one I opened is no longer visible after the forum has been offline. I’ve already taken my countermeasures, and my Edge will be patched. Good luck.
×
×
  • Create New...