← Back to context

Comment by galaxy_gas

5 days ago

Many sites do it .Included in many standard device fingerprinting / anti anonymity SAAS. Ebay facebook etc all do this ! But it looks this is first party to prevent the adblocking of them

1MB of obfuscated fingerprinting + portscan + Webgl . But oddity this one is trying to find burp suite specific route's.

Madness! How do I harden my network against that?

  • Chrome is already in the process of killing it https://developer.chrome.com/blog/local-network-access

    • The company I work for has a legitimate service that runs on the loopback (it provides our web apps APIs for some device integration) hopefully its just as simple as the user accepting the prompt else we'll be drowning in support. We had to go the path of the local service because they killed NPAPI. I've been thinking about using web serial as an alternative but Firefox doesn't support it.

      That being said, I think this is an overall win, hopefully Firefox implements it in a consistent manner as well.

      3 replies →

  • You should actually harden your browser or PC... to block any unwanted requests. Apparently some browser extensions can do that.

  • It would be the job of the operating system to give or take away the ability of your browser to access your local network. But you can run your browser in a container/vm and disable localhost. (And use a separate browser for localhost only if you need it.)