| ▲ | mixmastamyk 5 hours ago | |||||||||||||||||||||||||||||||||||||||||||||||||
If you're behind a NAT and have an evergreen browser, say FF with UBO, avoid email attachments, etc... it's not very risky. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| ▲ | esseph 4 hours ago | parent [-] | |||||||||||||||||||||||||||||||||||||||||||||||||
Did you know a website can scan your lan through a browser now? https://developer.chrome.com/blog/local-network-access Did you know that a lot of current home router NAT implementations are currently broken, in particular for UDP traffic handling, and you can therefore spoof your way into the network? https://www.armis.com/research/nat-slipstreaming-v2-0/ A lot of router vulnerabilities floating around out there. Ever hear of UPnP/UPnP2? Did you know that applications can trigger your router to open inbound ports for you? There have also been some 0 click exploits lately, those are fun. You don't have to do anything at all! https://github.com/Defense-Intelligence-Agency/Zero-Click-Ex... Yeah, you're still at risk, and moreso because you're not aware of how open you are. | ||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||