▲ | asimovDev 3 days ago | ||||||||||||||||
Embarrassed to say that I wasn't aware of this practice. Are there malicious uses for this beyond fingerprinting? | |||||||||||||||||
▲ | privacyking 3 days ago | parent | next [-] | ||||||||||||||||
Yes. Facebook was using this trick on Android. Meta's android apps would host a server on localhost, and their sites would communicate with this local server to pass tracking information that would otherwise be blocked by all browser protection methods on Android. I guess it is still fingerprinting, but at the most extreme end. | |||||||||||||||||
▲ | inferiorhuman 3 days ago | parent | prev | next [-] | ||||||||||||||||
Mostly it's great for tracking although I'm sure it could also be used to exfiltrate data (e.g. if the user is running something sensitive on localhost). https://www.digitalsamba.com/blog/metas-localhost-spyware-ho... | |||||||||||||||||
▲ | palmfacehn 3 days ago | parent | prev | next [-] | ||||||||||||||||
Routers with vulnerable URLs. You can search for: "router" "authentication bypass". | |||||||||||||||||
| |||||||||||||||||
▲ | asimovDev 3 days ago | parent | prev [-] | ||||||||||||||||
https://files.catbox.moe/g1bejn.png When I visit the site from Safari on macOS I see this in the console. Are there any particular services that use port 8888 for the website to do this? | |||||||||||||||||
|