Skip to content
  • Categories
  • Recent
  • Tags
  • All Topics
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Caint logo. It's just text.
  1. Home
  2. Uncategorized
  3. GNU Emacs: new critical remote shell injection vulnerability
Welcome to Caint!

Issues? Post in Comments & Feedback
You can now view, reply, and favourite posts from the Fediverse. You can click here or click on the on the navigation bar on the left.

GNU Emacs: new critical remote shell injection vulnerability

Scheduled Pinned Locked Moved Uncategorized
newssoftwaregnuemacssecurityhackingterminallinuxcveopensourcefreesoftware
37 Posts 7 Posters 72 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • Lorenzo Ancora :verified:L This user is from outside of this forum
    Lorenzo Ancora :verified:L This user is from outside of this forum
    Lorenzo Ancora :verified:
    wrote on last edited by
    #1

    GNU Emacs: new critical remote shell injection vulnerability.

    Red Hat discovered a command injection flaw in the text editor Emacs. It allows a remote, unauthenticated attacker to execute any command on your computer. The vulnerability is activated when you visit a malicious website or link.

    https://www.cve.org/CVERecord?id=CVE-2025-1244

    ---

    #news #software #gnu #emacs #security #hacking #terminal #linux #cve #opensource #freesoftware

    ---

    Mitigation: uninstall/update immediately.

    Alexandre OlivaL 1 Reply Last reply
    0
    • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

      GNU Emacs: new critical remote shell injection vulnerability.

      Red Hat discovered a command injection flaw in the text editor Emacs. It allows a remote, unauthenticated attacker to execute any command on your computer. The vulnerability is activated when you visit a malicious website or link.

      https://www.cve.org/CVERecord?id=CVE-2025-1244

      ---

      #news #software #gnu #emacs #security #hacking #terminal #linux #cve #opensource #freesoftware

      ---

      Mitigation: uninstall/update immediately.

      Alexandre OlivaL This user is from outside of this forum
      Alexandre OlivaL This user is from outside of this forum
      Alexandre Oliva
      wrote on last edited by
      #2
      ironically, the cve website itself also attempts to install and run commands on your computer, and if you don't allow it, it will refuse to let you know about the vulnerability
      GNU/翠星石S 1 Reply Last reply
      0
      • Alexandre OlivaL Alexandre Oliva
        ironically, the cve website itself also attempts to install and run commands on your computer, and if you don't allow it, it will refuse to let you know about the vulnerability
        GNU/翠星石S This user is from outside of this forum
        GNU/翠星石S This user is from outside of this forum
        GNU/翠星石
        wrote on last edited by
        #3
        @lxo @LorenzoAncora Rather - ironically, the CVE website performs arbitrarily code execution on your computer (a SEVERE vulnerability) and if your web browser doesn't have that severe vulnerability, nothing displays?
        Lorenzo Ancora :verified:L 1 Reply Last reply
        0
        • GNU/翠星石S GNU/翠星石
          @lxo @LorenzoAncora Rather - ironically, the CVE website performs arbitrarily code execution on your computer (a SEVERE vulnerability) and if your web browser doesn't have that severe vulnerability, nothing displays?
          Lorenzo Ancora :verified:L This user is from outside of this forum
          Lorenzo Ancora :verified:L This user is from outside of this forum
          Lorenzo Ancora :verified:
          wrote on last edited by
          #4

          @Suiseiseki cve.org is popular and safe to use. JavaScript is a web standard that helps ensure compliance with EU safety regulations and accessibility requirements. It is implemented by 97.69% of web browsers and utilized by 98.3% of all public websites. Therefore, its presence on the CVE site is standard practice for modern web functionality.

          Please see: https://ieji.de/@LorenzoAncora/114098428234129692

          GNU/翠星石S 1 Reply Last reply
          0
          • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

            @Suiseiseki cve.org is popular and safe to use. JavaScript is a web standard that helps ensure compliance with EU safety regulations and accessibility requirements. It is implemented by 97.69% of web browsers and utilized by 98.3% of all public websites. Therefore, its presence on the CVE site is standard practice for modern web functionality.

            Please see: https://ieji.de/@LorenzoAncora/114098428234129692

            GNU/翠星石S This user is from outside of this forum
            GNU/翠星石S This user is from outside of this forum
            GNU/翠星石
            wrote on last edited by
            #5
            @LorenzoAncora >cve.org is popular and safe to use.
            You write that, but then I see the following Obfscript;
            https://cmp.osano.com/AzyhULTdPkqmy4aDN/46057d56-0263-4cca-abac-9adddada4f3b/osano.js
            https://www.cve.org/assets/index-mLL8icbW.js

            Those are sufficiently large programs that would be quite trivial to slip proprietary malware in and have such go unnoticed.

            Any attacker wouldn't even need to compromise the computer cve.org is running on to attack visitors - they could compromise cmp.osano.com instead.

            It seems more JavaScript programs are loaded too, although which ones are not revealed until you run proprietary JavaScript (free and nonfree JavaScript are mixed into the same file), which I refuse to do.

            >JavaScript is a web standard that helps ensure compliance with EU safety regulations and accessibility requirements.
            JavaScript absolutely destroys accessibility and seems to be primarily used to spy on the user, which doesn't exactly "comply with EU safety regulations".

            >It is implemented by 97.69% of web browsers and utilized by 98.3% of all public websites.
            97.69% of web browsers have a SEVERE vulnerability and a little less than 98.3% of public websites attack people with proprietary software and spyware huh?

            >its presence on the CVE site is standard practice for modern web functionality.
            Just because attacking the user is standard practice doesn't mean a website that doesn't function without JavaScript is acceptable.

            The only JavaScript your website needs and should have is as follows;
            <script>
            /* AGPLv3-or-later */
            document.body.innerHTML = 'We have detected that you have JavaScript enabled in your browser, please disable it to continue. Please be aware that your browser is severely compromised as it is automatically running malicious JavaScript.'
            </script>
            Lorenzo Ancora :verified:L 1 Reply Last reply
            0
            • GNU/翠星石S GNU/翠星石
              @LorenzoAncora >cve.org is popular and safe to use.
              You write that, but then I see the following Obfscript;
              https://cmp.osano.com/AzyhULTdPkqmy4aDN/46057d56-0263-4cca-abac-9adddada4f3b/osano.js
              https://www.cve.org/assets/index-mLL8icbW.js

              Those are sufficiently large programs that would be quite trivial to slip proprietary malware in and have such go unnoticed.

              Any attacker wouldn't even need to compromise the computer cve.org is running on to attack visitors - they could compromise cmp.osano.com instead.

              It seems more JavaScript programs are loaded too, although which ones are not revealed until you run proprietary JavaScript (free and nonfree JavaScript are mixed into the same file), which I refuse to do.

              >JavaScript is a web standard that helps ensure compliance with EU safety regulations and accessibility requirements.
              JavaScript absolutely destroys accessibility and seems to be primarily used to spy on the user, which doesn't exactly "comply with EU safety regulations".

              >It is implemented by 97.69% of web browsers and utilized by 98.3% of all public websites.
              97.69% of web browsers have a SEVERE vulnerability and a little less than 98.3% of public websites attack people with proprietary software and spyware huh?

              >its presence on the CVE site is standard practice for modern web functionality.
              Just because attacking the user is standard practice doesn't mean a website that doesn't function without JavaScript is acceptable.

              The only JavaScript your website needs and should have is as follows;
              <script>
              /* AGPLv3-or-later */
              document.body.innerHTML = 'We have detected that you have JavaScript enabled in your browser, please disable it to continue. Please be aware that your browser is severely compromised as it is automatically running malicious JavaScript.'
              </script>
              Lorenzo Ancora :verified:L This user is from outside of this forum
              Lorenzo Ancora :verified:L This user is from outside of this forum
              Lorenzo Ancora :verified:
              wrote on last edited by
              #6

              @Suiseiseki the scripts do not appear to contain malware:
              https://www.virustotal.com/gui/url/0e7795408fa7cc6e918cbb0526bc804fece03f7b7685bebdc971670910088fea

              https://www.virustotal.com/gui/url/b698d39b69b283657a4120248b211baeeb6be9b9f46a0bf873bfbcb5cbf622ac

              All JavaScript files you've linked to are minified (compressed), not obfuscated. Almost all websites use compression to improve loading times. You can simply use the auto-format of your text editor to read minified scripts with minimal effort.

              Alexandre OlivaL 1 Reply Last reply
              0
              • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                @Suiseiseki the scripts do not appear to contain malware:
                https://www.virustotal.com/gui/url/0e7795408fa7cc6e918cbb0526bc804fece03f7b7685bebdc971670910088fea

                https://www.virustotal.com/gui/url/b698d39b69b283657a4120248b211baeeb6be9b9f46a0bf873bfbcb5cbf622ac

                All JavaScript files you've linked to are minified (compressed), not obfuscated. Almost all websites use compression to improve loading times. You can simply use the auto-format of your text editor to read minified scripts with minimal effort.

                Alexandre OlivaL This user is from outside of this forum
                Alexandre OlivaL This user is from outside of this forum
                Alexandre Oliva
                wrote on last edited by
                #7
                so you run trojans from two malicious web sites to "prove" that another web site is not malicious. that's as reasonable as asking both coca-cola and pepsi whether their softdrinks are healthy to drink. they don't seem to be affecting only browsers, but also users' brains 😞

                that it makes the site completely inaccessible to, per your own numbers, 2.31% of browsers, where web standards recommend graceful degradation instead of big bold red letters stating "don't feel welcome" to those with specific accessibility needs that both major brands of browsers can't tend to, is a big "screw you" to me and others

                that it renders computers unusable to access this very site, computers whose manufacturers have abandoned, by refusing to patch known security vulnerabilities that can be exercised with remotely-supplied javascript and refusing to allow owners to patch them by themselves, computers that would still be perfectly usable to visit web sites that actually took the trouble to abide by web standards instead of jumping on the "you must enable javascript" "screw you" mindless bandwagon, adds insult to injury, and more litter to the pile

                that a web site that ought to be as security conscious as it goes, and reports vulnerabilities even on browsers, that enable web sites to induce remote execution of arbitrary code on visitors' computers, demands visitors to open up their computers to such risks is not only contradictory to its mission, it's a "screw you" to security education as well.

                CC: @Suiseiseki@freesoftwareextremist.com
                Lorenzo Ancora :verified:L 1 Reply Last reply
                0
                • Alexandre OlivaL Alexandre Oliva
                  so you run trojans from two malicious web sites to "prove" that another web site is not malicious. that's as reasonable as asking both coca-cola and pepsi whether their softdrinks are healthy to drink. they don't seem to be affecting only browsers, but also users' brains 😞

                  that it makes the site completely inaccessible to, per your own numbers, 2.31% of browsers, where web standards recommend graceful degradation instead of big bold red letters stating "don't feel welcome" to those with specific accessibility needs that both major brands of browsers can't tend to, is a big "screw you" to me and others

                  that it renders computers unusable to access this very site, computers whose manufacturers have abandoned, by refusing to patch known security vulnerabilities that can be exercised with remotely-supplied javascript and refusing to allow owners to patch them by themselves, computers that would still be perfectly usable to visit web sites that actually took the trouble to abide by web standards instead of jumping on the "you must enable javascript" "screw you" mindless bandwagon, adds insult to injury, and more litter to the pile

                  that a web site that ought to be as security conscious as it goes, and reports vulnerabilities even on browsers, that enable web sites to induce remote execution of arbitrary code on visitors' computers, demands visitors to open up their computers to such risks is not only contradictory to its mission, it's a "screw you" to security education as well.

                  CC: @Suiseiseki@freesoftwareextremist.com
                  Lorenzo Ancora :verified:L This user is from outside of this forum
                  Lorenzo Ancora :verified:L This user is from outside of this forum
                  Lorenzo Ancora :verified:
                  wrote on last edited by
                  #8

                  @lxo you're welcome. If you need the screenshot of something else just ask, I'll gladly use the latest build of Mozilla Firefox on my up-to-date Linux to take a screenshot for you.

                  CVE.org is supported by the Cybersecurity and Infrastructure Security Agency (CISA) and by MITRE, a 65 years old corporation specialized in national defense, financial systems and cybersecurity.
                  Its staff has 25 years of experience. If this website isn't safe, we're all doomed. 🙂

                  CC: @Suiseiseki , @tennoseremel

                  Alexandre OlivaL 1 Reply Last reply
                  0
                  • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                    @lxo you're welcome. If you need the screenshot of something else just ask, I'll gladly use the latest build of Mozilla Firefox on my up-to-date Linux to take a screenshot for you.

                    CVE.org is supported by the Cybersecurity and Infrastructure Security Agency (CISA) and by MITRE, a 65 years old corporation specialized in national defense, financial systems and cybersecurity.
                    Its staff has 25 years of experience. If this website isn't safe, we're all doomed. 🙂

                    CC: @Suiseiseki , @tennoseremel

                    Alexandre OlivaL This user is from outside of this forum
                    Alexandre OlivaL This user is from outside of this forum
                    Alexandre Oliva
                    wrote on last edited by
                    #9
                    even if it were still safe now, it is one take-over away from becoming nonsafe, and all the wrong things it's teaching now will become vulnerabilities that the future hostile owner will be able to exploit. it's negligent security malpractice.

                    CC: @Suiseiseki@freesoftwareextremist.com @tennoseremel@lor.sh
                    Lorenzo Ancora :verified:L 1 Reply Last reply
                    0
                    • Alexandre OlivaL Alexandre Oliva
                      even if it were still safe now, it is one take-over away from becoming nonsafe, and all the wrong things it's teaching now will become vulnerabilities that the future hostile owner will be able to exploit. it's negligent security malpractice.

                      CC: @Suiseiseki@freesoftwareextremist.com @tennoseremel@lor.sh
                      Lorenzo Ancora :verified:L This user is from outside of this forum
                      Lorenzo Ancora :verified:L This user is from outside of this forum
                      Lorenzo Ancora :verified:
                      wrote on last edited by
                      #10

                      @lxo I understand your concerns, but MITRE and CISA's oversight ensures CVE.org's security and integrity. Regular audits, bug reporting programs and frequent updates help mitigate future risks.

                      Alexandre, living in irrational fear of interactive webpages isn't healthy. We live only once, mate! 🙂

                      I'm currently satisfied and use their services with gratitude. If I had anything to say about their ethics, I would tell them personally.
                      I advise you do the same.

                      CC: @Suiseiseki @tennoseremel

                      GNU/翠星石S Alexandre OlivaL 2 Replies Last reply
                      0
                      • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                        @lxo I understand your concerns, but MITRE and CISA's oversight ensures CVE.org's security and integrity. Regular audits, bug reporting programs and frequent updates help mitigate future risks.

                        Alexandre, living in irrational fear of interactive webpages isn't healthy. We live only once, mate! 🙂

                        I'm currently satisfied and use their services with gratitude. If I had anything to say about their ethics, I would tell them personally.
                        I advise you do the same.

                        CC: @Suiseiseki @tennoseremel

                        GNU/翠星石S This user is from outside of this forum
                        GNU/翠星石S This user is from outside of this forum
                        GNU/翠星石
                        wrote on last edited by
                        #11
                        @LorenzoAncora @lxo @tennoseremel If MITRE and CISA was actually carrying out sufficient oversight, they would require that the page work without JavaScript.

                        Living in irrational trust of webpages that serve malicious software and trying to convince rational people to run such malware isn't healthy.


                        You do not need JavaScript to write an interactive website - rather the best interactive websites don't use JavaScript and instead use HTML5+CSS+fastCGI; https://git.savannah.gnu.org/cgit/
                        Lorenzo Ancora :verified:L 1 Reply Last reply
                        0
                        • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                          @lxo I understand your concerns, but MITRE and CISA's oversight ensures CVE.org's security and integrity. Regular audits, bug reporting programs and frequent updates help mitigate future risks.

                          Alexandre, living in irrational fear of interactive webpages isn't healthy. We live only once, mate! 🙂

                          I'm currently satisfied and use their services with gratitude. If I had anything to say about their ethics, I would tell them personally.
                          I advise you do the same.

                          CC: @Suiseiseki @tennoseremel

                          Alexandre OlivaL This user is from outside of this forum
                          Alexandre OlivaL This user is from outside of this forum
                          Alexandre Oliva
                          wrote on last edited by
                          #12
                          the oversight has already failed, evidently, to have allowed such a contradictory web site to use their name. everyone is seeing how easy it is to turn a whole country with a quarter-millennium tradition of laic democracy into a self-destructing theocracy. your attitude of blind trust on the good intentions and harmlessness of common malpractice is anachronistic and unfit. your attempts to ridicule concerns that prove right time and again are an irresponsible embarrassment to serious security professionals, and to anyone paying attention to world politics without hiding the head in the sand.

                          as for living in irrational fear... should I remind you that it was you who brought into my timeline a report of a security problem related with allowing third parties to run arbitrary code on our computers? are you suggesting that nobody should take those reports seriously?

                          or are you one of those believers that the leopards will never bite your face?

                          CC: @Suiseiseki@freesoftwareextremist.com @tennoseremel@lor.sh
                          Yuchen PeiQ 1 Reply Last reply
                          0
                          • Alexandre OlivaL Alexandre Oliva
                            the oversight has already failed, evidently, to have allowed such a contradictory web site to use their name. everyone is seeing how easy it is to turn a whole country with a quarter-millennium tradition of laic democracy into a self-destructing theocracy. your attitude of blind trust on the good intentions and harmlessness of common malpractice is anachronistic and unfit. your attempts to ridicule concerns that prove right time and again are an irresponsible embarrassment to serious security professionals, and to anyone paying attention to world politics without hiding the head in the sand.

                            as for living in irrational fear... should I remind you that it was you who brought into my timeline a report of a security problem related with allowing third parties to run arbitrary code on our computers? are you suggesting that nobody should take those reports seriously?

                            or are you one of those believers that the leopards will never bite your face?

                            CC: @Suiseiseki@freesoftwareextremist.com @tennoseremel@lor.sh
                            Yuchen PeiQ This user is from outside of this forum
                            Yuchen PeiQ This user is from outside of this forum
                            Yuchen Pei
                            wrote on last edited by
                            #13
                            @lxo
                            > everyone is seeing how easy it is to turn a whole country with a quarter-millennium tradition of laic democracy into a self-destructing theocracy.

                            Not sure what this is about.
                            @LorenzoAncora @Suiseiseki @tennoseremel
                            Alexandre OlivaL 1 Reply Last reply
                            0
                            • GNU/翠星石S GNU/翠星石
                              @LorenzoAncora @lxo @tennoseremel If MITRE and CISA was actually carrying out sufficient oversight, they would require that the page work without JavaScript.

                              Living in irrational trust of webpages that serve malicious software and trying to convince rational people to run such malware isn't healthy.


                              You do not need JavaScript to write an interactive website - rather the best interactive websites don't use JavaScript and instead use HTML5+CSS+fastCGI; https://git.savannah.gnu.org/cgit/
                              Lorenzo Ancora :verified:L This user is from outside of this forum
                              Lorenzo Ancora :verified:L This user is from outside of this forum
                              Lorenzo Ancora :verified:
                              wrote on last edited by
                              #14

                              @Suiseiseki HTML5 alone cannot replace JavaScript because it lacks the capability to handle events, manipulate the DOM in real-time, or perform asynchronous operations, which are essential for creating dynamic, accessible and interactive pages.

                              FastCGI, executing server-side, is computationally more expensive because it requires multiple web requests and can be more vulnerable to remote code execution and misconfigurations than client-side JavaScript.

                              CC: @tennoseremel @lxo

                              GNU/翠星石S 1 Reply Last reply
                              0
                              • Yuchen PeiQ Yuchen Pei
                                @lxo
                                > everyone is seeing how easy it is to turn a whole country with a quarter-millennium tradition of laic democracy into a self-destructing theocracy.

                                Not sure what this is about.
                                @LorenzoAncora @Suiseiseki @tennoseremel
                                Alexandre OlivaL This user is from outside of this forum
                                Alexandre OlivaL This user is from outside of this forum
                                Alexandre Oliva
                                wrote on last edited by
                                #15
                                heh, I guess this means my assessment that everyone is seeing it is wrong, for at least one person isn't

                                CC: @Suiseiseki@freesoftwareextremist.com @LorenzoAncora@ieji.de @tennoseremel@lor.sh
                                Lorenzo Ancora :verified:L 1 Reply Last reply
                                0
                                • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                                  @Suiseiseki HTML5 alone cannot replace JavaScript because it lacks the capability to handle events, manipulate the DOM in real-time, or perform asynchronous operations, which are essential for creating dynamic, accessible and interactive pages.

                                  FastCGI, executing server-side, is computationally more expensive because it requires multiple web requests and can be more vulnerable to remote code execution and misconfigurations than client-side JavaScript.

                                  CC: @tennoseremel @lxo

                                  GNU/翠星石S This user is from outside of this forum
                                  GNU/翠星石S This user is from outside of this forum
                                  GNU/翠星石
                                  wrote on last edited by
                                  #16
                                  @LorenzoAncora @tennoseremel @lxo >it lacks the capability to handle events, manipulate the DOM in real-time, or perform asynchronous operations
                                  You do not need any of those things.

                                  If you wanted things to be asynchronous on the same page for a laugh, there's something called iframe.

                                  >FastCGI, executing server-side, is computationally more expensive because it requires multiple web requests
                                  JavaScript requires multiple web requests just to load the JavaScript and then continuous web requests to do each operation, so really JavaScript loses again.

                                  FastCGI really only needs a single request back and forth for every operation.

                                  You can hand optimize the software on the FastCGI end with assembly if you want to minimize how computationally expensive each operation is.

                                  Generally sequentially processing operations on one computer in an efficient manner (doing mostly the same operation over and over again is pretty cache efficient) uses less power than doing the operations in an inefficient way across 1000, 10,000 or millions of computers.

                                  JavaScript is a way to just dump the processing onto the client (and as the client is the one who has to pay for the power, usually the JavaScript is left completely unoptimized).

                                  >can be more vulnerable to remote code execution and misconfigurations than client-side JavaScript.
                                  I'm not sure about the validity of this claim, as fastCGI usually takes user input as POST fields, which is usually properly escaped, unlike a lot of client side JavaScript, which seems to send JavaScript objects, or JSON blobs to the server.
                                  Lorenzo Ancora :verified:L 1 Reply Last reply
                                  0
                                  • GNU/翠星石S GNU/翠星石
                                    @LorenzoAncora @tennoseremel @lxo >it lacks the capability to handle events, manipulate the DOM in real-time, or perform asynchronous operations
                                    You do not need any of those things.

                                    If you wanted things to be asynchronous on the same page for a laugh, there's something called iframe.

                                    >FastCGI, executing server-side, is computationally more expensive because it requires multiple web requests
                                    JavaScript requires multiple web requests just to load the JavaScript and then continuous web requests to do each operation, so really JavaScript loses again.

                                    FastCGI really only needs a single request back and forth for every operation.

                                    You can hand optimize the software on the FastCGI end with assembly if you want to minimize how computationally expensive each operation is.

                                    Generally sequentially processing operations on one computer in an efficient manner (doing mostly the same operation over and over again is pretty cache efficient) uses less power than doing the operations in an inefficient way across 1000, 10,000 or millions of computers.

                                    JavaScript is a way to just dump the processing onto the client (and as the client is the one who has to pay for the power, usually the JavaScript is left completely unoptimized).

                                    >can be more vulnerable to remote code execution and misconfigurations than client-side JavaScript.
                                    I'm not sure about the validity of this claim, as fastCGI usually takes user input as POST fields, which is usually properly escaped, unlike a lot of client side JavaScript, which seems to send JavaScript objects, or JSON blobs to the server.
                                    Lorenzo Ancora :verified:L This user is from outside of this forum
                                    Lorenzo Ancora :verified:L This user is from outside of this forum
                                    Lorenzo Ancora :verified:
                                    wrote on last edited by
                                    #17

                                    @Suiseiseki iFrames are discouraged by most web dev guidelines, as they can embed malicious remote content, allowing criminals to inject malware, steal information, or conduct fraud, whereas client-side JavaScript is sandboxed within the isolated context of the webpage with same-origin policy restrictions.

                                    Client-side processing grants improved responsiveness, better privacy and faster loadings, also reducing the carbon footprint by avoiding unnecessary web requests.

                                    CC: @tennoseremel @lxo

                                    GNU/翠星石S 1 Reply Last reply
                                    0
                                    • Alexandre OlivaL Alexandre Oliva
                                      heh, I guess this means my assessment that everyone is seeing it is wrong, for at least one person isn't

                                      CC: @Suiseiseki@freesoftwareextremist.com @LorenzoAncora@ieji.de @tennoseremel@lor.sh
                                      Lorenzo Ancora :verified:L This user is from outside of this forum
                                      Lorenzo Ancora :verified:L This user is from outside of this forum
                                      Lorenzo Ancora :verified:
                                      wrote on last edited by
                                      #18

                                      @lxo no Alexander, even saints met opposition.
                                      When you don't see much opposition, it only means nobody else thought sharing their informed opinions and discuss honestly with you was worth their time. In other words, that nobody else believed in your ability to think rationally, understand different perspectives and thus improve.

                                      CC: @quasi @Suiseiseki @tennoseremel

                                      Alexandre OlivaL 1 Reply Last reply
                                      0
                                      • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                                        @lxo no Alexander, even saints met opposition.
                                        When you don't see much opposition, it only means nobody else thought sharing their informed opinions and discuss honestly with you was worth their time. In other words, that nobody else believed in your ability to think rationally, understand different perspectives and thus improve.

                                        CC: @quasi @Suiseiseki @tennoseremel

                                        Alexandre OlivaL This user is from outside of this forum
                                        Alexandre OlivaL This user is from outside of this forum
                                        Alexandre Oliva
                                        wrote on last edited by
                                        #19
                                        WTH are you even talking about? what are you making about me? turn this around and see how much opposition you are (not) seeing to the nonsense you're pushing that untrusted JavaScript (download from third parties) can be executed safely, but iFrames (that carry JavaScript also from third parties, for that matter) can. does it follow that, because you're not seeing opposition, it's because (as you put it so fake-politely) nobody else was willing to waste time as I was to share informed opinions and discuss honestly with you, or to believe your ability to think rationally? I see your point, I regret wasting my time with you already. hopefully what I wrote in this thread may have a positive effect on others.

                                        CC: @quasi@peister.org @Suiseiseki@freesoftwareextremist.com @tennoseremel@lor.sh
                                        Lorenzo Ancora :verified:L 1 Reply Last reply
                                        0
                                        • Lorenzo Ancora :verified:L Lorenzo Ancora :verified:

                                          @Suiseiseki iFrames are discouraged by most web dev guidelines, as they can embed malicious remote content, allowing criminals to inject malware, steal information, or conduct fraud, whereas client-side JavaScript is sandboxed within the isolated context of the webpage with same-origin policy restrictions.

                                          Client-side processing grants improved responsiveness, better privacy and faster loadings, also reducing the carbon footprint by avoiding unnecessary web requests.

                                          CC: @tennoseremel @lxo

                                          GNU/翠星石S This user is from outside of this forum
                                          GNU/翠星石S This user is from outside of this forum
                                          GNU/翠星石
                                          wrote on last edited by
                                          #20
                                          @LorenzoAncora @tennoseremel @lxo >iFrames are discouraged by most web dev guidelines, as they can embed malicious remote content,
                                          So iframes without JavaScript is bad, but a page full of malicious proprietary JavaScript without iframes is good? Huh.

                                          Have you considered that JavaScript is always the "malicious remote content"?

                                          >allowing criminals to inject malware, steal information, or conduct fraud
                                          Exploitation, information exfiltration etc require JavaScript to pull off - meanwhile you cannot do any of that with just HTML.

                                          >whereas client-side JavaScript is sandboxed within the isolated context of the webpage
                                          Have you considered that there's always a sandbox bypass?

                                          >with same-origin policy restrictions.
                                          Last time I checked those can be applied to iframes just as well.

                                          >Client-side processing grants improved responsiveness, better privacy and faster loadings, also reducing the carbon footprint by avoiding unnecessary web requests.
                                          In reality, I find that cgit is far more responsive and loads faster and has better privacy than JavaScript-based git hosts, which are much slower and really hit the CPU hard - increasing electrical consumption substantially.

                                          If you want to reduce CO₂ emissions, one effective move would be to eliminate JavaScript.
                                          LisPiL 1 Reply Last reply
                                          0
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Don't have an account? Register

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • All Topics
                                          • Popular
                                          • World
                                          • Users
                                          • Groups