Explore >> Select a destination


You are here

www.sjoerdlangkemper.nl
| | tom.vg
3.9 parsecs away

Travel
| | [AI summary] This article discusses browser-based timing attacks that exploit side-channel information to infer resource sizes and user data, highlighting examples like social network group membership and defense mechanisms such as blocking third-party cookies.
| | attilaolah.eu
3.9 parsecs away

Travel
| | This is intended to be a short list of things to check before you go publish awebsite or web app (or really, anything that interacts with a browser). Itstarts with...
| | timtech.blog
2.4 parsecs away

Travel
| | Fun with Cross-Site Request Forgery (CSRF) in a creative Web Timing Attack scenario, highlighting the risks inherent to SameSite=None session cookies.
| | jaketrent.com
27.0 parsecs away

Travel
| If you don't see your HTTP response header in the browser, check your CORS policy. It's likely the culprit.