Jump to content

Search the Community

Showing results for tags 'proxy'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Informatii generale
    • Anunturi importante
    • Bine ai venit
    • Proiecte RST
  • Sectiunea tehnica
    • Exploituri
    • Challenges
    • Bug Bounty
    • Programare
    • Reverse engineering & exploit development
    • Mobile phones
    • Sisteme de operare si discutii hardware
    • Electronica
    • Wireless Pentesting
    • Black SEO & monetizare
  • Tutoriale
    • Tutoriale in romana
    • Tutoriale in engleza
    • Tutoriale video
  • Programe
    • Programe hacking
    • Programe securitate
    • Programe utile
    • Free stuff
  • Discutii generale
    • RST Market
    • Off-topic
    • Discutii incepatori
    • Stiri securitate
    • Sugestii
    • Linkuri
    • Cosul de gunoi
  • Club Test's Topics
  • Clubul saraciei absolute's Topics
  • Chernobyl Hackers's Topics
  • Programming & Fun's Jokes / Funny pictures (programming related!)
  • Programming & Fun's Programming
  • Programming & Fun's Programming challenges
  • Bani pă net's Topics
  • Cumparaturi online's Topics
  • Web Development's Forum
  • 3D Print's Topics


There are no results to display.

There are no results to display.


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



Website URL










Found 59 results

  1. Traffic Exploder is a bot that will allow you to Dominate website traffic. This bot will supercharge your website, increasing the visitors, views and bounce rate by ten fold. Traffic will continuously flow from every part of the world based on the parameters you specify. Imagine what unlimited traffic can do for you : Decrease bounce rate Increase impressions Increase Unique Visitors Make your site more appealing to banner ad marketplaces (via more impressions) Increase views on any page which counts views and ranks/rates you based on those views Lower Alexa (untested) Sell Traffic to others for an easy income Sell View Increasing Services Sell your high-traffic site for more (vs. no traffic site) and more.... Features : Enter an Referral URL (New 1.06) Deep link clicking (New 1.06) Improved Proxy Finding/Testing (New 1.06) Improved Thread Control (New 1.06) Multiple URLs Unlimited Views Proxy Harvester - Built into the core, never worry about proxies or unique IPs Proxy Scrubbing Random Pause Interval Timeout Control Thread Control Easy to use, get started in seconds Progress Bar and Statistics Safe Traffic : This bot generates safe traffic to your website. It does not click on any ads nor will it get you banned from any ad marketplaces. Download
  2. Salutare! Milioane de scuze..Nu stiu unde sa postez.. Caut un site cu PROXY socks fresh us..Ma ajutati si pe mine va rog din toata inima mea! Jur ca va cinstesc!!! Multumesc! Din nou, SCUZE pentru acest top.. dar chiar sunt in mare cautare...:( O zi spledida! :X:X
  3. Buna prieteni care vând un proxy dintr-o dată, în baza de date 2kk + linii 80% valabile (cu un cec) Prețul întregii baze este de 150 de dolari. Dau un test oamenilor cu reputație, oamenilor cu reputație, pentru că vor vedea gravitatea persoanei în raport cu bunurile, și nu cu cine să nu fii prea leneș să dai câteva piese, să dai câteva piese și să le dai. Vreau să cumpăr o bază, dar vreau să verific acest lucru este un link la profil, am verifica totul perfect, am da o încercare, apoi dacă totul este bine scrie, vreau să cumpăr o bază de date și de muncă prin intermediul garantului! Preț de bază 150 $ Contacte Jabber: // Removed
  4. scanner


    O lista fresh & free de PPTP VPN din Ukraina. admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin admin guest guest guest guest guest guest test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test test user user user user user user user user 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn vpn # Fac rost de PPTP VPN din orice TARA/ORAS/REGIUNE.
  5. SOCKS LIVE | | SOCKS4 | 0.88s | Warsaw | 78 | Unknown | Poland | gem18.internetdsl.tpnet.pl | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.49s | Orenburg | 55 | 460052 | Russian Federation | | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.49s | Astrakhan | 07 | Unknown | Russian Federation | | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.49s | Unknown | Unknown | Unknown | Sweden | anon-44-188.vpn.ipredator.se | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS5 | 0.49s | Unknown | Unknown | Unknown | Unknown | ip-104-238-96-231.ip.secureserver.net | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.49s | Unknown | Unknown | Unknown | Indonesia | router-it.inmagine.com | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.52s | Unknown | Unknown | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.52s | Unknown | Unknown | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.52s | Beinasco | 12 | 10092 | Italy | net-2-32-33-105.cust.vodafonedsl.it | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.52s | Unknown | Unknown | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.52s | Daugavpils | 06 | Unknown | Latvia | | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.52s | Unknown | Unknown | Unknown | Greece | mcbs60.static.otenet.gr | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.43s | Pesochin | 07 | Unknown | Ukraine | ua1.multi-vpn.biz | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.52s | Grodno | 03 | Unknown | Belarus | | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.52s | Unknown | Unknown | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS5 | 0.52s | Unknown | Unknown | Unknown | United States | cpe-104-172-197-162.socal.res.rr.com | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.56s | Kathmandu | 00 | Unknown | Nepal | | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.56s | Unknown | Unknown | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS5 | 0.49s | Nova Milanese | 09 | 20834 | Italy | host100-81-static.243-95-b.business.telecomitalia.it | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.63s | Cordova | TN | 38018 | United States | c-73-177-110-95.hsd1.tn.comcast.net | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.63s | Pleven | 50 | 5800 | Bulgaria | 212-233-216-133-pleven.optisprint.bg | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4/5 | 0.62s | Unknown | Unknown | Unknown | Colombia | | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS5 | 0.63s | Lake Charles | LA | 70605 | United States | r74-193-215-3.alexcmta02.alxnla.by.dh.suddenlink.net | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.65s | Mansoura | 01 | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | SOCKS4 | 0.65s | Kirovograd | 10 | Unknown | Ukraine | 135.223.pool.seti.kr.ua | Checked at [url]https://proxyradar.com[/url] HTTPS LIVE | | HTTPS | 1.34s | Unknown | Unknown | Unknown | Iran, Islamic Republic of | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.49s | Moscow | 48 | Unknown | Russian Federation | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.45s | Kiev | 12 | Unknown | Ukraine | ip-6929.proline.net.ua | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.35s | Guayaquil | 10 | Unknown | Ecuador | host-200-124-246-153.ecutel.net | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.49s | Kiev | 12 | Unknown | Ukraine | relay.oblik.com.ua | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.42s | Buenos Aires | 07 | Unknown | Argentina | 91-90-189-190.cab.prima.net.ar | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.80s | Unknown | Unknown | Unknown | Venezuela | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.06s | Unknown | Unknown | Unknown | Russian Federation | 10.i-anterra.ru | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.49s | Rome | 07 | 00199 | Italy | host39-38-static.17-80-b.business.telecomitalia.it | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.24s | Victoria | 08 | Unknown | Seychelles | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.82s | Unknown | Unknown | Unknown | South Africa | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.49s | Nerima | 40 | Unknown | Japan | ip76ee025c.ap.nuro.jp | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.88s | Urdinarrain | 08 | 2826 | Argentina | host180.201-252-250.telecom.net.ar | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.42s | Unknown | Unknown | Unknown | Albania | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.42s | Ibarra | 07 | Unknown | Venezuela | 201-242-2-84.genericrev.cantv.net | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.46s | Shah Alam | 12 | Unknown | Malaysia | spm.com.my | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.72s | Cajuru | 27 | 14240 | Brazil | 177-74-191-225.static.skysever.com.br | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.60s | Cairo | 11 | Unknown | Egypt | host- | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.49s | Chernihiv | 02 | Unknown | Ukraine | cn-avto.com.ua | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.44s | Tucuman | 24 | Unknown | Argentina | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.45s | Jakarta | 04 | Unknown | Indonesia | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.47s | Amsterdam | 07 | Unknown | Netherlands | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 1.68s | Maracaibo | 23 | Unknown | Venezuela | 201-211-192-127.genericrev.cantv.net | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.75s | Lima | 15 | Unknown | Peru | | Checked at [url]https://proxyradar.com[/url] LIVE | | HTTPS | 0.43s | Moscow | 48 | 125009 | Russian Federation | Nigiri.access.comstar.ru | Checked at [url]https://proxyradar.com[/url]
  6. Care este cea mai buna metoda pentru a detecta daca un utilizator foloseste proxy atunci cand intra pe un site ? Stiu ca unele proxy sunt imposibil de detectat, ma intereseaza sa le detectez pe alea care nu il protejeaza 100% pe utilizator. Momentan folosesc acest cod PHP , dar este o metoda veche si unele proxy nu seteaza Headers. Se poate face ceva cu JavaScript ? Sau alte metode PHP ? Am mai vazut o metoda care face reverse si verifica portul , nu este ok , se incarca greu pagina si porturile sunt multe iar rezultatul poate fi fals pozitiv. Nu vreau sa folosesc API sau Servicii oferite cu BlackListuri sau etc... $proxy_headers = array( 'HTTP_VIA', 'HTTP_X_FORWARDED_FOR', 'HTTP_FORWARDED_FOR', 'HTTP_X_FORWARDED', 'HTTP_FORWARDED', 'HTTP_CLIENT_IP', 'HTTP_FORWARDED_FOR_IP', 'VIA', 'X_FORWARDED_FOR', 'FORWARDED_FOR', 'X_FORWARDED', 'FORWARDED', 'CLIENT_IP', 'FORWARDED_FOR_IP', 'HTTP_PROXY_CONNECTION' ); foreach($proxy_headers as $x){ if (isset($_SERVER[$x])) echo("You are using a proxy!"); } UPDATE (poate mai are nevoie cineva) : What is a "WebRTC leaks"? WebRTC implement STUN (Session Traversal Utilities for Nat), a protocol that allows to discover the public IP address. Live Demo : https://diafygi.github.io/webrtc-ips/ More Info : https://www.privateinternetaccess.com/forum/discussion/8204/how-to-stop-webrtc-local-ip-address-leaks-on-google-chrome-and-mozilla-firefox-while-using-private-i Am intrat cu proxy si mi-a afisat Ip-ul real, functioneaza in Chrome si Firefox. Cu VPN nu a reusit sa vada ip-ul real. Pe Android si alte browsere , din ce am citit , nu functioneaza. Pentru a dezactiva WebRTC : Mozilla Firefox: Type "about:config” in the address bar. Scroll down to “media.peerconnection.enabled”, double click to set it to false. Google Chrome: Install Google official extension WebRTC Network Limiter. Thanks to
  7. Smart DNS Proxy IPS (expiring on Tuesday, July 19, 2016) ////////////////////////////////////////////////////// Australia - Melbourne Australia - Sydney Brazil Canada - Montreal Canada - Toronto Germany India Ireland Israel Italy Japan Mexico Netherlands New Zealand Singapore South Africa 1 South Africa 2 Spain Sweden Switzerland Turkey US East - N. Virginia US Center - Dallas US West - Los Angeles
  8. Caut si eu niste proxy sau socks-uri in special sa fie US , pentru CL posting US. Daca stiti unele bune , ceva private desigur, nu conteaza preturile.
  9. This intelligent software will automatically send UNLIMITED amount of visitors to your website for free. The VisitorMaker allow you drive your visitors come from ANY COUNTRY, ANY DEVICE, ANY BROWSER, ANY REFERRAL, SEARCH ENGINE. You can also open multiple instances. Visitor Maker 1.2, it can be used to increase your website ranking in Google as well as Alexa. Visitor Maker 1.2 supports : * Automatic page views * Inner-page views * Multi-threaded operations * Supports all proxy types (HTTP, SOCKS, SSL, FTP) * Random User Agent * Random Referrer HTTP bypass Google Analytic Tutorial : * TimeOut: How long do you want to wait for your proxy to connect until it moves to the next one. * Delay: How long you want the duration of the visit to last. * Show Browser: Display browsers windows for each connection. * User Agent: List user agent use for each connection. User Agent is random for each connection. What is a user-agent ? See here: User agent - Wikipedia, the free encyclopedia Referrer : List of referring websites to use for each connection. Each connection will choose a random referrer the list. Inner Pages : The list of pages which you want program go to after the first visit. This is a new feature in version 1.2. It allow you increase Bounce Rate. More about Exit Rate vs Bounce Rate on Google. Download
  10. geeko

    Google proxies enjoy
  11. Azi am vorbit putin despre ceva noutati, asupra configu-rilor, aici va las, unele chiar foarte utile.. Nu fac proof la toate dar toate merg bine! -> Bots 1-50 -> Proxy DA -> Combo E-mail pass -> spicetv.ro -> Proof -> Config Private Paste - Pastie ......................................................................... -> Bots cat mai putini nu treceti de 10, Recomand 7-8 -> Proxy NU -> combo user pass -> Proof -> config Private Paste - Pastie Mofos Private Paste - Pastie GTA5 PC nou Private Paste - Pastie keep2shared configPrivate Paste - Pastie avg http://pastie.org/private/0fuoaktt5vg0v1oljlogq Naked nou ttp://pastie.org/private/reedtsexpwgqjpzhf5rxg Nu trece'ti peste 50 de boti, ca o sa le futeti, si dupa aia nu mai dau!
  12. Stie cineva un program prin care sa te conectezi la un proxy manual?, in trecut am folosit un ceva, da am uitat numele.....deci nu vreau un program din asta de vpn, vreau unul care sa bag eu proxy cu portul, si sa dau pe un buton de conectare si gata (cred ca se intelege).
  13. Pentru audituri semi-automate. Asta-i scris in Ruby; Majoritatea sunt in Java. Functioneaza ca un proxy local, precum Burp Suite sau alte cele. download via
  14. Vreau sa il folosesc ca sa instalez programe de la PPI pe el, dupa ce sunt platit il dezinstalez si instalez cu alt ip (cu proxy) si tot asa, deci nu imi trebuie sa fie de tone de Gb
  15. oORaZvANOo


    Salut imi puteti spune ce fel de proxy sa caut pentru acesti booti de cs 1.6 va rog. GirlShare - Download XFakePlayers v1.11 (1).rar
  16. bog-mir

    Lista proxy

    Salut! Are cineva o lista proxy pentru xFakePlayers cs1,6???
  17. Download here Free proxy list online - Free proxy servers list - Online proxy checker - Socks list - Web proxy list
  18. Ar fi foarte util daca sar adauga optiuna de proxy-uri.. De exemplu cum este aici. > Pasul 1 > Pasul 2 Proxy se actualizeaza automat la ei.. Ce parere aveti?
  19. proxyfire.v1.25 + keygen Hallo all... download http://www.mediafire.com/download/kbda098gfcabqfg/proxyfire.v1.25+++keygen.rar or https://mega.co.nz/#!T9gihCyZ!fKkhmR30vFNUtl9vJr7cN39lCI3JnZz6zRmwqK4UNms
  20. English: The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security experience and as such is ideal for developers and functional testers who are new to penetration testing. ZAP provides automated scanners as well as a set of tools that allow you to find security vulnerabilities manually. Roman?: Zed Attack Proxy ( ZAP ) este un instrument u?or de folosit , integrat ca tool de pentesting pentru identificarea vulnerabilit??ilor în aplica?iile web. Acesta este conceput pentru a fi utilizat de c?tre persoane cu o gam? larg? de experien?? în securitate ?i, ca atare este ideal pentru dezvoltatori ?i cei noi în Pentesting. ZAP prevede scanere automate , precum ?i un set de instrumente care v? permit s? g?si?i vulnerabilit??i de securitate manual . Windows ? Download: Zed Attack Proxy 2.4.0 Windows Installer ? Packet Storm Linux ? Download: Zed Attack Proxy 2.4.0 Linux Release ? Packet Storm MAC OS X ? Download: Zed Attack Proxy 2.4.0 Mac OS X Release ? Packet Storm Source: Packet Storm
  21. http://pastebin.com/VGhdsUZM
  22. io.kent

    proxy list

    rst! - Pastebin.com
  23. geeko

    free proxy's

    free Socks 4, Socks 5, HTTP, and HTTPS with anonymity levels ranging from none to high. link: Proxy Lust enjoy
  24. * Do not require proxy * Max. 20 per check * Easy and fast check JTg2JURCaSVGRiVGQzAlQzMlMUIlQTklQjYlOEYlREQlOTclNUU5JUQzJUNFJTdCJURCJUZDZ2pnJUFCaiVCRiVDMA==
  25. The information security news today is all about Lenovo’s default installation of a piece of adware called “Superfish” on a number of laptops shipped before February 2015. The Superfish system is essentially a tiny TLS/SSL “man in the middle” proxy that attacks secure connections by making them insecure — so that the proxy can insert ads in order to, oh, I don’t know, let’s just let Lenovo tell it: “To be clear, Superfish comes with Lenovo consumer products only and is a technology that helps users find and discover products visually,” the representative continued. “The technology instantly analyses images on the web and presents identical and similar product offers that may have lower prices, helping users search for images without knowing exactly what an item is called or how to describe it in a typical text-based search engine.” Whatever. The problem here is not just that this is a lousy idea. It’s that Lenovo used the same certificate on every single Laptop it shipped with Superfish. And since the proxy software also requires the corresponding private key to decrypt and modify your web sessions, that private key was also shipped on every laptop. It took all of a day for a number of researchers to find that key and turn themselves into Lenovo-eating interception proxies. This sucks for Lenovo users. If you’re a Lenovo owner in the affected time period, go to this site to find out if you’re vulnerable and (hopefully) what to do about it. But this isn't what I want to talk about in this post. Instead, what I’d like to discuss is some of the options for large-scale automated fixes to this kind of vulnerability. It’s quite possible that Lenovo will do this by themselves — pushing an automated patch to all of their customers to remove the product — but I'm not holding my breath. If Lenovo does not do this, there are roughly three options: Lenovo users live with this and/or manually patch. If the patch requires manual effort, I’d estimate it’ll be applied to about 30% of Lenovo laptops. Beware: the current uninstall package does not remove the certificate from the root store! Microsoft drops the bomb. Microsoft has a nuclear option themselves in terms of cleaning up nasty software — they can use the Windows Update mechanism or (less universally) the Windows Defender tool to remove spyware/adware. Unfortunately not everyone uses Defender, and Microsoft is probably loath to push out updates like this without massive testing and a lot of advice from the lawyers. Google and Mozilla fix internally. This seems like a more promising option. Google Chrome in particular is well known for quickly pushing out security updates that revoke keys, add public key pins, and generally make your browsing experience more secure. It seems unlikely that #1 and #2 will happen anytime soon, so the final option looks initially like the most promising. Unfortunately it's not that easy. To understand why, I'm going to sum up some reasoning given to me (on Twitter) by a couple of members of the Chrome security team. The obvious solution to fixing things at the Browser level is to have Chrome and/or Mozilla push out an update to their browsers that simply revokes the Superfish certificate. There's plenty of precedent for that, and since the private key is now out in the world, anyone can use it to build their own interception proxy. Sadly, this won't work! If Google does this, they'll instantly break every Lenovo laptop with Superfish still installed and running. That's not nice, or smart business for Google. A more promising option is to have Chrome at least throw up a warning whenever a vulnerable Lenovo user visits a page that's obviously been compromised by a Superfish certificate. This would include most (secure) sites any Superfish-enabled Lenovo user visits -- which would be annoying -- and just a few pages for those users who have uninstalled Superfish but still have the certificate in their list of trusted roots. This seems much nicer, but runs into two problems. First, someone has to write this code -- and in a hurry, because attacks may begin happening immediately. Second, what action item are these warnings going to give people? Manually uninstalling certificates is hard, and until a very nice tool becomes available a warning will just be an irritation for most users. One option for Google is to find a way to deal with these issues systemically -- that is, provide an option for their browser to tunnel traffic through some alternative (secure) protocol to a proxy, where it can then go securely to its location without being molested by Superfish attackers of any flavor. This would obviously require consent by the user -- nobody wants their traffic being routed through Google otherwise. But it's at least technically feasible. Google even has an extension for Android/iOS that works something like this: it's a compressing proxy extension that you can install in Chrome. It will shrink your traffic down and send it to a proxy (presumably at Google). Unfortunately this proxy won't work even if it was available for Windows machines -- because Superfish will likely just intercept its connections too So that's out too, and with it the last obvious idea I have for dealing with this in a clean, automated way. Hopefully the Google team will keep going until they find a better solution. The moral of this story, if you choose to take one, is that you should never compromise security for the sake of a few bucks -- because security is so terribly, awfully difficult to get back. Sursa: A Few Thoughts on Cryptographic Engineering: How to paint yourself into a corner (Lenovo edition)
  • Create New...