TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Google's mysterious 'search.app' links leave Android users concerned

29 点作者 N19PEDL26 个月前

5 条评论

saghm6 个月前
One of the weirder parts of this to me is this:<p>&gt; After publishing this piece, multiple BleepingComputer readers have pointed out an anomaly with the TLS certificate issued for the &#x27;search.app&#x27; domain.<p>&gt; To add confusion, search.app&#x27;s certificate has the Common Name (CN) set to fallacni.com, a French language website that claims to help you &quot;find your national identity card.&quot;<p>&gt; BleepingComputer further noticed that the same SSL certificate is in use by more than a hundred domains, shown below, which are hosted on the same Firebase server (IP address 199.36.158.100)<p>Is this typical for how Firebase (and similar offerings) work? Is there any risk of one site on a shared Firebase server being able to MITM users that are collocated on the same IP and using the same certificate, or is having a separate domain enough to mitigate this? I&#x27;d never considered the idea of entirely unrelated (and separately owned) domains sharing an identical TLS certificate before, and I&#x27;m not enough a crypto&#x2F;security person to be able to immediately think through the ramifications of this.
评论 #42090678 未加载
ilidur6 个月前
Review: the article finds multiple instances of users saying that when sharing from the Google discover in built web frame prepends a link shortener type website allowing Google to intermediate the link.<p>The article speculates that it can be used for sender and receiver tracking, but also offers a positive option which would be blocking malicious shares.<p>No explanation is given by Google when reached.
yaky6 个月前
Google Chat has been redirecting every clicked link through Google&#x27;s domains for a while now.<p>Which is sketchy too, and I don&#x27;t understand how this is OK with their business and corporate customers.
评论 #42088342 未加载
olyjohn6 个月前
These companies want us to reduce phishing, etc attacks by being smart and looking at URLs before we click on them. Then they obfuscate them constantly like this so we can&#x27;t see the actual URL. Then they wonder why phishing attacks constantly keep working.<p>This is every single company. Just trying to log into my doctor&#x27;s patient portal, I go to my doctor&#x27;s website, which redirects me to some weird 3rd party URL, which sends me to some authentication URL, then finally to the patient portal after I login, which is back to another URL. And the business names are never in the URLs. It&#x27;s always &quot;mypatientportal&quot; or some URL with some old business name from a company that got acquired.<p>The most annoying thing is these fuckers keep blaming the users for getting phished. Just keep training the users. More training. More training that doesn&#x27;t seem to be helping for some reason.<p>But here&#x27;s more proof that they put metrics and data gathering over actual security. People need to learn how URLs work for fucks sake and start pushing back against their company when they do this shit. It always goes ignored everywhere I work.
YetAnotherNick6 个月前
They mean Subject Alternative Name (SAN) not Server Name Indication (SNI).