On 03-07 19:19, [email protected] wrote:
> On Thu, Mar 05, 2020 at 07:32:36AM -0700, Luke A. Call wrote:
> > I just leave javascript off for usual browsing, with a tab sitting open
> > in chromium or iridium to turn it on for the occasional temporary need,
> > or added to the browser's exception list to allow permanently for
> > certain sites.  This partly because it seems easy, and partly since I 
> > probably won't know if a browser extension is sold to a malicious entity, or
> > otherwise compromised (so, seems a smaller attack surface, but still usually
> > convenient.)  
> As I know many sites without js doesn't work. Anyway I don't understand
> how switching off js defend you from 0day browser bug.
> Maybe you mean that because many 0day concern javascript ?

Yes, as well as the general category of speculative execution CPU
attacks, rowhammer-type attacks, evercookies that use javascript, 
and/or whatever else I don't know about that is enabled by javascript.
It just seems to be required for many attacks that one reads about, over
time, and given that trend, probably some future ones, all from
downloading unknown code to run locally.  For those fewer times when I do
enable it, I'm glad for OBSD's various protections, to further lower
risk.
-- 
Luke Call
My thoughts:  http://lukecall.net  (updated 2020-02-18)

Reply via email to