Intermarkets' Privacy Policy
Support
Donate to Ace of Spades HQ!
Recent Entries
Absent Friends
Bandersnatch 2024
GnuBreed 2024
Captain Hate 2023
moon_over_vermont 2023
westminsterdogshow 2023
Ann Wilson(Empire1) 2022
Dave In Texas 2022
Jesse in D.C. 2022
OregonMuse 2022
redc1c4 2021
Tami 2021
Chavez the Hugo 2020
Ibguy 2020
Rickl 2019
Joffen 2014
AoSHQ Writers Group
A site for members of the Horde to post their stories seeking beta readers, editing help, brainstorming, and story ideas. Also to share links to potential publishing outlets, writing help sites, and videos posting tips to get published.
Contact OrangeEnt for info: maildrop62 at proton dot me
Cutting The Cord And Email Security
Moron Meet-Ups
|
« Tuesday Overnight Open Thread (9/26/23) |
Main
| The Morning Report — 9/27/23 »
September 27, 2023
Daily Tech News 27 September 2023
Top Story
- A new attack on GPUs can steal data from web pages as you view them. (Ars Technica)
This affects all significant GPU manufacturers - not just AMD and Nvidia, but also Intel (including integrated graphics), Apple, ARM, and Qualcomm's Adreno graphics, and impacts Chrome and Chromium-based browsers including Microsoft Edge.
How worried should you be?
Not at all.
In the example provided by the security researchers, visitors to a malicious website that showed Wikipedia in an embedded frame (which Wikipedia allows websites to do) could have their usernames read by the site inside of, well, half an hour.
If they didn't scroll the page at all during that time.
What the hack does is very clever though not very useful, but is a great example of an entire class of tricks called side-channel attacks.
The host website (the malicious one) loads the Wikipedia content, and then starts drawing over it invisibly using SVG filters. (SVG is scalable vector graphics, a set of drawing operations supported by web browsers.)
Most browsers support hardware acceleration for SVG, and if that is in effect, there is a consistent, measurable - though tiny - difference in the time taken to draw SVG filters depending on what is behind the filter.
So by drawing filters over and over, at slightly different angles and screen locations, you can tell the difference between white background and black text depending on how long the drawing operations over each pixel take on average.
It's statistical, and slow, but it gives you a blurry copy of what is showed on screen in a page that is supposed to be safely sandboxed away from the malicious site.
So after half an hour of busily drawing invisible filters, the host website - knowing where on the page Wikipedia shows the username - has a blurry copy of that tiny section of the page and can OCR it and find out who you are.
Of course, if you scroll the page at all during that half hour, its fun is ruined and all it gets is a jumbled mess.
And what hackers really want is passwords and credit card CVCs, and all that it can get there - even if you leave the page whirring away with the login box open for half an hour - is *******.
But when you see these hacks that leak data at the rate of one bit per minute or something like that, they are doing the digital equivalent of very, very slowly shading in a page on a notepad to get an impression of what was written on the previous page.
Tech News
Disclaimer: Donna Noble has an overdue library book. Donna Noble has been fined.
posted by Pixy Misa at 04:15 AM
| Access Comments
|
Recent Comments
Recent Entries
Search
Polls! Polls! Polls!
Frequently Asked Questions
The (Almost) Complete Paul Anka Integrity Kick
Top Top Tens
Greatest Hitjobs
|