Malicious Site Safe Browsing API

preview_player
Показать описание
Just a demo of what goes on behind the curtains of a seemingly simple connection to a web site. Connections are made to Google when safe browsing is selected.
Рекомендации по теме
Комментарии
Автор

Had google ban my whole domain because of a jellyfin instance that I had never shared with anyone and only used myself, only because it used jellyfin subdomain, duh. Really annoying and creepy: one company can block any site in almost all browsers (some don't even let you ignore the warning and proceed).

ilya_mzp
Автор

Decentraleyes or LocalCDN browser plugins and uBlock Origin should reduce most outside requests for font and script assets.

galen__
Автор

Browser keeps a local list of hashed domain names concidered bad. When you vist one that matches it queries api to see if it is still bad.

NoHandleToSpeakOf
Автор

@Paul - the reporting of the site as "deceptive/dangerous" looks like a malicious act (competitor, disgruntled customer, personal grudge holder, etc.) and there has been direct harm done to his business reputation from this. I browsed it here (I'm in the UK) and it responds that way too.
It's really important that it be reported I think - a formal AFP complaint may be necessary (I think they have a site for this?). The formal recording of the trail is important, Google will store details on the registration. I would suspect there are grounds to sue accordingly - protection of the trade name and reputation needs to be demonstrated if I remember correctly (I'm no lawyer but in the end it's rather important).

davocc
Автор

My email server web gui was also put on google's deceptive site list. It was removed quite quickly after I reported it as a false flag.

hex
Автор

That's surprising firefox have used googles api. I would of thought their team would of implemented a solution themselves.

TradieTrev
Автор

My guess is like with email, they might be checking the IP address reputation of what you're trying to visit. If a spammer on a /24 starts hitting blacklists, the other people sharing the /24 will sometimes be listed where the spam "blocking" company believe the IP addresses are being swapped around

BangBangBang.
Автор

Could the trigger that causes a check to happen be because of the lack of https?

starshipduck
Автор

I love the comment for your black list filter 🤣c***s.

Techie-B
Автор

I don't know what it's like now... but a few years back, i7 Intel NUC, had a tendency to overheat. If it was in a temperature-controlled space, everything was fine... loud but fine... however, when in a room with no AC, it overheated and halted from time to time.

krzychadam
Автор

It is really hard to find the right balance between locking down your browser and the amount of information it leaks, and not breaking the web completely. Tor browser is one option worth looking at. The disconnect plugin has a good "visualise page" option for seeing how extensively most pages make connections to all of the major players in tracking and monitoring of user behaviour. I work really hard to minimise the amount of random advertising my kids see. I estimated once that up to 10% of people's waking lives is subverted away from doing useful stuff and toward advertising material by the way the web operates these days.

DanielSMatthews
Автор

really... I'll hit the IRC instead. It seems if I post anything about the URL I mentioned, it deletes the post. Seems to be triggered from the words home and dns and org.

farktard
Автор

I had weird issues with browsers resolving corporate (internal) DNS versus external DNS. (DoH, etc)
Maybe Google is doing this because it's resolving a public IP vs your internal DNS?

Does Firefox/chrome do this with the official website?

🍻

jamess
Автор

Pfsense as your router instead of the PI make sure you get something with good CPU

TheADiggins
Автор

It's odd that both Chrome and Firefox report that as unsafe, but Microsoft Chrome (aka Edge) does not!

jaromanda
Автор

It did a lookup, it’s not dns though until it fails back

a
Автор

Apparently some plugins also cause this, if he has a Wordpress site.

dave-
Автор

Another way to bypass this block screen is to type, without quotes or spaces, “thisisunsafe”

It also works where Strict HISTs is enabled.

calluminglis
Автор

editing your hosts file is a bit dangerous, as you forget that you have done it, and then wonder why stuff is broken two years later, and then end up wasting lots of time until you check the file.

brodienz