Page 1 of 1

Another 1x1 pixel vulnerability

Posted: Sun Mar 13, 2016 9:37 pm
by morganism
Maybe these 1x1 pixel sets should just automatically be blocked at the browser level.
I find them in most saved pages when i am stripping out chaff

https://torrentfreak.com/private-tracke ... it-160313/

Re: Another 1x1 pixel vulnerability

Posted: Sun Mar 13, 2016 9:43 pm
by barbaz
Yep, this type of thing is one of the reasons why I use tools like ABE and µMatrix to set up restrictions on cross-site requests to and from this board.

Re: Another 1x1 pixel vulnerability

Posted: Mon Mar 14, 2016 12:25 am
by Thrawn
So...if I'm reading correctly, the significance of the BBCode was the ability to match the client data (which could be collected by anyone who can post an image link) to a username?