Excited that my anti-phishing Chrome extension, Password Alert, just launched! http://googleonlinesecurity.blogspot.com/2015/04/protect-your-google-account-with.html …pic.twitter.com/sz6BNSV0UI
@DrewHintz When https://bugs.webkit.org/show_bug.cgi?id=16735 … is fixed, that'll allow sites to locally brute 18000 tries/h, right? See blog comment in moderation
-
-
@tehjh I just updated our security readme about our protections against brute forcing: https://github.com/google/password-alert/blob/master/SECURITY.md … -
@DrewHintz Uh, my spoofed event made it through to the background script, passed the content script checks. - 3 more replies
New conversation -
-
-
@DrewHintz Apart from the charcode being 0 b/c of a bug, sites can spoof keypresses to the extension w/ document.{create,dispatch}EventThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.