lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CANoWnEQj0OU+HhOQX7=_DKURvBncwEyj26dtz-DXzS-6KUONAA@mail.gmail.com> Date: Wed, 28 Sep 2011 01:11:04 +1000 From: dave bl <db.pub.mail@...il.com> To: Mario Vilas <mvilas@...il.com> Cc: full-disclosure <full-disclosure@...ts.grok.org.uk> Subject: Re: Twitter URL spoofing still exploitable On 28 September 2011 01:00, Mario Vilas <mvilas@...il.com> wrote: > On Tue, Sep 27, 2011 at 3:26 PM, Dan Kaminsky <dan@...para.com> wrote: >>> >>> Ok, now nobody can spoof a URL, but how come a user will tell good >>> URLs and bad ones apart? Oh boy! >>> >> >> Wherever did you get the idea that users can do this? > > Jokes apart, I do find it annoying that URLs aren't expanded automatically > anymore. But I don't expect this situation to be permanent. Agreed. _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists