У нас вы можете посмотреть бесплатно Discord’s Strangest Doxxing Method… или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
🌏 Get an Exclusive NordVPN deal + 4 months extra here ➼ https://nordvpn.com/notexttospeech It’s risk-free with Nord’s 30-day money-back guarantee! ✌ Imagine getting a friend request on Discord, or being sent an emoji, and having your general location revealed. Well Hackermon, a bug bounty hunter, figured out a "0-click deanonymization attack" that affects Discord, Signal, and a bunch of other platforms that utilize cloudflare's CDN. Now if you had no idea what I just said, don't worry. I'll be breaking down Discord's strangest doxxing method for people that don't speak computer. And I'll be answering the question on whether or not you should be worried about this... LINKS ----------------------------------------------------------------------------- Hackermon's Article https://gist.github.com/hackermondev/... SOCIALS ----------------------------------------------------------------------------- Discord Server / discord Twitter / notexttospeech TIMESTAMPS ----------------------------------------------------------------------------- 00:00 - Explaining the Exploit 05:06 - Testing the Friend Request Exploit 08:05 - Testing the Emoji Exploit 09:30 - Drawbacks and Dangers 10:09 - Danger 1 - Another Stalking Tool 10:30 - Drawback 2 - Accuracy? 11:46 - Danger 2 - Discord Users are Dumb 12:41 - Drawback 3 - Live in the boonies? 13:00 - Danger 3 - Journalists, activitists, and terrorists BEWARE 13:57 - Drawback 4 - Basic Anonymity tools 14:14 - Should you even care?