Remix.run Logo
tekla 11 hours ago

https://www.taxpayeradvocate.irs.gov

I can't tell if this is trying to seem fake.

caymanjim 11 hours ago | parent | next [-]

Seriously. This reads like self-promotion of a bad YouTube channel or something. It's amateurish, full of self-aggrandizement and opinions. This has no place coming from our gov't.

altairprime 8 hours ago | parent | prev | next [-]

FYI: https://en.wikipedia.org/wiki/Office_of_the_Taxpayer_Advocat...

blitzar 6 hours ago | parent | prev | next [-]

> An official website of the U.S. Gov

Looks as legit as the email I got from the official office of The Prince of Nigeria.

tzs 10 hours ago | parent | prev [-]

What seems fake about it?

tekla 10 hours ago | parent [-]

Compare this site to the base domain.

https://www.irs.gov/

Do you think it looks official? Or does it look like someone spent $10 on a 3rd world rando to make a site on Wordpress and a spoofed URL and didn't even bother to make it part of the official site.

9 hours ago | parent | next [-]
[deleted]
DANmode 9 hours ago | parent | prev [-]

> Do you think it looks official?

I check the address bar for that.

tekla 8 hours ago | parent [-]

You mean the thing that has been the source of many cybersecurity issues for years because fonts w/ ambiguous characters and varying levels of "how closely are you actually reading the URL"?

The very thing where sites like gmai1.com that look exactly like the real site phish creds?

Or things that even Google has issues with subdomains?

https://hoxhunt.com/blog/advanced-phishing-attack-using-goog...

The IRS site does use lots of subdomains like https://sa.www4.irs.gov, but even it looks like its using the same design language as the normal site.

DANmode 5 hours ago | parent [-]

> You mean the thing that has been the source of many cybersecurity issues for years because fonts w/ ambiguous characters and varying levels of "how closely are you actually reading the URL"? The very thing where sites like gmai1.com that look exactly like the real site phish creds?

Yes, that’s the one.

If I’m really paranoid, I’ll:

1.) avoid providing data to that page

2.) cross-reference host IP

3.) find the page on the original URL via search index