Saturday, December 04, 2021

INK-STAINED SKILLS to capture the foibles, memes, hypocrisies and other head-slapping events in the world of politics

A teaser to start Cartoon Carousel

The nation’s cartoonists on the week in politics

Every week political cartoonists throughout the country and across the political spectrum apply their ink-stained skills to capture the foibles, memes, hypocrisies and other head-slapping events in the world of politics. The fruits of these labors are hundreds of cartoons that entertain and enrage readers of all political stripes. Here's an offering of the best of this week's crop, picked fresh off the Toonosphere. Edited by Matt Wuerker.

 

Political cartoon.

Friday, December 03, 2021

Starlink and China launches, DART seen from Earth & more in VFS Weekly

Solar Wind Watch Tonight, Disaster Cycle, Magnetosense | S0 News Dec.3.2021

The Largest Ponzi Schemes in History

**** X LEAKS: Beware ****

Researchers discover 14 new data-stealing web browser attacks

Privacy

IT security researchers from Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences have discovered 14 new types of 'XS-Leak' cross-site leak attacks against modern web browsers, including Google Chrome, Microsoft Edge, Safari, and Mozilla Firefox.

These types of side-channel attacks are called 'XS-Leaks,' and allow attacks to bypass the 'same-origin' policy in web browsers so that a malicious website can steal info in the background from a trusted website where the user enters information.

"The principle of an XS-Leak is to use such side-channels available on the web to reveal sensitive information about users, such as their data in other web applications, details about their local environment, or internal networks they are connected to," explains the XS-Leaks wiki.

For example, an XS-Leak attack could help a background site siphon the email inbox contents from an active tab used for accessing webmail.

The process of an XS-LeakSource: XSinator

Cross-site leaks aren't new, but as the researchers point out, not all of them have been identified and classified as XS-Leaks, and their root cause remains unclear.

Their research aims to systematically search for new XS-Leaks, evaluate potential mitigations, and generally gain a better understanding of how they work.

Finding new XS-Leaks

The researchers first identified three characteristics of cross-site leaks and evaluated all inclusion methods and leak techniques for a large set of web browsers.

The three main ingredients of all XS-Leaks are inclusion methods, leak techniques, and detectable differences.

After creating a model based on the above, the researchers found 34 XS-Leaks, 14 of which were novel (marked with a plus sign below).

All of the XS-Leaks identified in the study.Source: XSinator

Next, they tested the 34 XS-Leaks against 56 combinations of browsers and operating systems to determine how vulnerable each of them was.

Then they built a web application named XSinator, consisting of three components:

  1. A testing site that acts as the attacker page, implementing known and novel X-Leaks
  2. A vulnerable web app that simulates the behavior of a state-dependent resource.
  3. A database containing all previous test results.

You can visit the XSinator page yourself and run the test to see how well your web browser and OS fare against the 34 X-Leaks.

You can find a full list of XS-leaks that various browsers are vulnerable to below:

How to defend against X-Leaks

Mitigating or addressing the risks that arise from these side-channel attacks need to be resolved by browser developers.

Researchers suggest denying all event handler messages, minimizing error message occurrences, applying global limit restrictions, and creating a new history property when redirection occurs.

2021 National College Fed Challenge Winner presentation (Pace University)

The Snowflake Mystery

Zelensky Calls for a European Army as He Slams EU Leaders’ Response

      Jan 23, 2026 During the EU Summit yesterday, the EU leaders ...