TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Code Verify: An open source browser extension for verifying code authenticity

60 点作者 harporoeder大约 1 年前

9 条评论

markussss大约 1 年前
I think that that is supposed to prepare web apps for verification in the browser, in order to not allow them to run or connect to a remote server unless they are confirmed to be not tampered with, and that the main goal of this is to disallow usage of websites and related services unless ads are served. An adblock-blocker in the browser, sold as a security feature that protects against no real threats.<p>I refuse to believe that rouge browser extensions and userscripts are such a big problem that Meta decides to invest in security against those attack vectors.
评论 #39459596 未加载
评论 #39461684 未加载
评论 #39464929 未加载
mdaniel大约 1 年前
(2022)<p><a href="https:&#x2F;&#x2F;github.com&#x2F;facebookincubator&#x2F;meta-code-verify">https:&#x2F;&#x2F;github.com&#x2F;facebookincubator&#x2F;meta-code-verify</a> is the goods, and is MIT<p><a href="https:&#x2F;&#x2F;github.com&#x2F;facebookincubator&#x2F;meta-code-verify#installation">https:&#x2F;&#x2F;github.com&#x2F;facebookincubator&#x2F;meta-code-verify#instal...</a> says Safari support is &quot;coming soon&quot; (from 2022) so I guess they think those users don&#x27;t need to &quot;verify[..] the integrity of a web page.&quot;
paxys大约 1 年前
Makes sense at a technical level, but the threat this is meant to mitigate (FB&#x27;s servers&#x2F;TLS certs get compromised and start serving you malicious JS scripts, a browser extension pings Cloudflare and sees that the hash is incorrect) is a little too far fetched. For example wouldn&#x27;t the attacker also be able to update the expected hash on Cloudflare&#x27;s side, considering they have already compromised FB&#x27;s servers?
评论 #39460804 未加载
评论 #39457291 未加载
mike_d大约 1 年前
The hashes are checked against an endpoint hosted by Cloudflare. So technically Cloudflare or anyone able to MitM traffic to them (which would be anyone in a position to MitM Facebook as well) can still do evil things.<p>I haven&#x27;t ripped apart the extension yet, but there is no mention of cryptographically verifying the response from Cloudflare.<p>Edit: looks like they are checking for a number of ad blocking extensions and mark it as &quot;At Risk&quot; if detected.<p>Edit 2: Oh boy, I hope this is covered by their bug bounty program.
评论 #39462666 未加载
dboreham大约 1 年前
Problem with this approach at present is that many other browser extensions installed (not just extensions that have something to do with the FB site) will cause a false negative verification result. This is because they inject code into every JS file loaded.
userbinator大约 1 年前
I&#x27;ve already had to &quot;crack&quot; web apps with my MITM proxy to force them to behave, but in the past there haven&#x27;t been many. This is an escalation that is not surprising, and the reason why we must strongly oppose remote attestation if we are to continue to have freedom and control over our computing environments.<p>They are 100% using &quot;open source&quot; as a distraction here. The fact that you can see the source is irrelevant for the purpose they are trying to use this for.
zb3大约 1 年前
I don&#x27;t want to run &quot;authentic&quot; instagram which doesn&#x27;t even let me zoom the page.. That&#x27;s why I&#x27;m running the modified version and I won&#x27;t give it up without a (technical) fight
评论 #39461083 未加载
nialv7大约 1 年前
Wait, what even is the threat model here? I can&#x27;t come up with many scenarios in which this makes sense
评论 #39461907 未加载
sa-code大约 1 年前
For those who haven&#x27;t heard of it before, a sentence from the article explaining what it is<p>&gt; With Code Verify, you can confirm that your Instagram Web code hasn’t been tampered with or altered, and that your Instagram Web experience is the same as everyone else’s.
评论 #39456998 未加载