Comment by snowmobile 13 hours ago It's a neat program, but what's the use for JPGs and PNGs? 1 comment snowmobile Reply boston_clone 13 hours ago There are some neat detection bypass / compromise methods using various image formats, including PNG [0] and SVG [1]!I imagine that folks like journalists could have that type of attack in their threat model, and EFF already do a lot of great stuff in this space :)0. https://isc.sans.edu/diary/319981. https://www.cloudflare.com/cloudforce-one/research/svgs-the-...
boston_clone 13 hours ago There are some neat detection bypass / compromise methods using various image formats, including PNG [0] and SVG [1]!I imagine that folks like journalists could have that type of attack in their threat model, and EFF already do a lot of great stuff in this space :)0. https://isc.sans.edu/diary/319981. https://www.cloudflare.com/cloudforce-one/research/svgs-the-...
There are some neat detection bypass / compromise methods using various image formats, including PNG [0] and SVG [1]!
I imagine that folks like journalists could have that type of attack in their threat model, and EFF already do a lot of great stuff in this space :)
0. https://isc.sans.edu/diary/31998
1. https://www.cloudflare.com/cloudforce-one/research/svgs-the-...