42% of the Web's Top Sites Are Compromised

Discussion in 'other security issues & news' started by ronjor, Feb 8, 2018.

  1. ronjor

    ronjor Global Moderator

    Joined:
    Jul 21, 2003
    Posts:
    163,902
    Location:
    Texas
    7 Feb 2018 Tara Seals US/North America News Reporter, Infosecurity Magazine
     
  2. Daveski17

    Daveski17 Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    10,239
    Location:
    Lloegyr
  3. focus

    focus Registered Member

    Joined:
    Feb 5, 2007
    Posts:
    503
    Location:
    USA
    NoScript will show requested connections for a website. Wilders is one of the very few sites that has no "extras".
     
  4. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    Connections to 3rd parties from a lot of news sites I find to be the worst. Wilders is light and snappy.
     
  5. RockLobster

    RockLobster Registered Member

    Joined:
    Nov 8, 2007
    Posts:
    1,812
    The article is a little innacurate to say the 25 third party sites are for content. Usually just two or three provide content. The rest are pushing ads and snooping. I think the reason it is rarely discussed is because it is the corporate business model that no one wants to stick their neck out and publicly criticise.
     
  6. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    You know what I've never understood? After websites are loaded you can still see the browser making connections, so what the hell are these connections for? There is also no streaming of any kind of data, so it shouldn't be possible, yet browsers continue to download and upload data.
     
  7. Stefan Froberg

    Stefan Froberg Registered Member

    Joined:
    Jul 30, 2014
    Posts:
    747
    It's all thanks to the Web 2.0 hype, aka "web as a platform".
    And that can of worms was started when they introduced XMLHttpRequest (or "AJAX" for marketing heads) object.

    https://www.w3schools.com/xml/ajax_xmlhttprequest_create.asp

    And to add to top of that, most browsers of course have their own various telemetry stuff that they do in a background and user needs to usually opt-out.
     
  8. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I personally don't have the impression that these connections are used for telemetry. I think it's indeed because of AJAX, a lot of sites will continue to exchange data, even if there is no good reason for it, freaking hate it.
     
  9. Stefan Froberg

    Stefan Froberg Registered Member

    Joined:
    Jul 30, 2014
    Posts:
    747
    Yeah, I don't understand it either why seemingly static web page needs to have connections running in a background for no good reason (for example, I see several "xhr" request in Ublock Origin log when visiting some sites).

    At least most of the firefox own stuff can be silenced with this:
    https://github.com/pyllyukko/user.js/

    It's just insane what the FF sends .... :eek:
    Note:
    user_pref("privacy.clearOnShutdown.openWindows",true) needs to be commented out from that user.js
     
  10. JoWazzoo

    JoWazzoo Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    241
    Location:
    Ether
    How can I conveniently observe how much of this and what crap is going on?

    Sometimes I run Moo0 Connections Watcher and their file Monitor (and TCP View) et cetera. Until I shake my head or get ticked off. Non-stop...
     
  11. Stefan Froberg

    Stefan Froberg Registered Member

    Joined:
    Jul 30, 2014
    Posts:
    747
    Well, if you use FF then just install uBlock Origin extension (https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/) and open it's settings and from there "Open the logger".

    upload_2018-2-21_21-41-57.png

    Go to some google owned site for example:
    upload_2018-2-21_21-43-8.png

    And from the logger view you will see all the bad stuff highlighted with red.
    Here youtube for example:

    upload_2018-2-21_21-44-29.png

    And here washington post tracking you, including the video trackers they have embedded into their page:

    upload_2018-2-21_21-45-25.png

    EDIT:
    Please take a note how they are using https with their trackers these days: That's why tracker blocker built right into the browser (or with the help of extension) is always better than solutions outside of browser.

    EDIT2: However, outside solutions are not completely useless. If some domain is known to be nothing but ad delivering platform (doubleclick.com for example) then it, and all it's subdomains can be blocked much much more earlier, on a DNS level by installing own local DNS caching server to, say, router made of Raspberry Pi.

    So best and most complete defense is to use both: Block as much as possible of the *hit domains on a DNS level on your router and anythings else that get's slipped with the browser tracker blocker.
     
    Last edited: Feb 21, 2018
  12. JoWazzoo

    JoWazzoo Registered Member

    Joined:
    Nov 11, 2008
    Posts:
    241
    Location:
    Ether
    Thanks Stefan!! I do have ublock installed. Just checked and I see it - forgot Logger. cheers and thanks for all your effort
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.