Conversation

When you're reading articles and papers about interesting attacks, it's helpful to remember that there are very concrete things you can do to protect your web applications from side-channels: w3c.github.io/webappsec-post lays out effective mitigation strategies. Try them out!
Quote Tweet
New CPU side-channel attack named Spook.js takes aim at Chrome’s Site Isolation feature therecord.media/new-cpu-side-c
Show this thread
Image
2
49
Replying to and
I practically tried to deploy these on my very simple private webpage and stumbled upon several bugs in firefox that I was surprised weren't really prioritized. As long as this breaks things people won't deploy.
1
3
Show replies
Replying to and
Entirely right. If you know that a particular resource isn't personalized, and would be available to an attacker who knows how to use `curl`, then it's totally reasonable to mark it as `CORP: cross-origin`, a la resourcepolicy.fyi/#cross-origin.