![]() Registered Member ![]()
|
Hi guys,
https://plus.google.com/photos/10656778 ... OO-ic2KlgE Yeah, what's that all about? Best wishes community, Richard Addison
Proud to be powered by Plasma
|
![]() Registered Member ![]()
|
@Admin/moderator
Have you seen the images? The Neon homepage seems to contain insecure elements.
Proud to be powered by Plasma
|
![]() Registered Member ![]()
|
The paypal image on the homepage isn't loaded via https. just a simple fix on Neon's part.
|
![]() Registered Member ![]()
|
Hi, Yeah, I think the same. Is it exploitable?
Proud to be powered by Plasma
|
![]() KDE Developer ![]()
|
It just means someone who manages to intercept your network traffic could tell that you visited the neon website, and maybe replace that image with another.
|
![]() Registered Member ![]()
|
Exploitable to what end? You could replace the image, perhaps with **** data. It's not particularly harmful, especially given the image actually is served over https. Browser mixed-content detector doesn't care about that though, it sees http:// link and shrieks. It's been fixed already, anyway. |
![]() Registered Member ![]()
|
Isn't exactly what I'd like, is it?
Proud to be powered by Plasma
|
![]() Registered Member ![]()
|
Yeah, the issue is gone. Neon is one of the most (if not the most) prominent projects in Linuxworld. Hence it's likely to be targeted. @You who fixed it: Please keep us safe, okay? Thank you. I consider the matter closed. Best wishes community, Richard Addison
Proud to be powered by Plasma
|
![]() Global Moderator ![]()
|
Is there a single documented case of somebody man-in-the-middling a Linux distro's download site in the last 25 years? Just to calibrate the usage of the word "likely" ![]()
I'm working on the KDevelop IDE.
|
![]() Registered Member ![]()
|
|
![]() Global Moderator ![]()
|
That's a completely different attack path though, which is much more realistic, and which SSL doesn't protect you against ![]()
I'm working on the KDevelop IDE.
|
Registered users: abc72656, Bing [Bot], daret, Google [Bot], lockheed, Sogou [Bot], Yahoo [Bot]