• 13 Posts
  • 14 Comments
Joined 1 year ago
cake
Cake day: October 8th, 2023

help-circle

  • It will not be digest to send all what I use for you to see it (it will lead to TL;DR)

    but here an elements (loaded with XHR that give the problem

    <input id="something" name="something" type="text" placeholder="aPlaceholder"  minlength="3" maxlength="32" value="this value is more than the limiation of 32 char" autofocus required>
    

    So normally this element should be invalid and a CSS selector of :invalid should match. but it's not the case because the browser seem to not run the validation check on loaded elements... !?

    if we edit manually the input , for example removing one character then the validation process kick-in and the CSS selector work etc..









  • Yes I'm talking about it in my initial post.. but it's not changing the six steps

    six steps
    1. Found a smartphone ( with the spec you want and in your budget )
    2. Check if you can have\import it in your “country”
    3. Check if someone already cook a ROM that support that specific model
    4. or create it by yourself (even more time consuming )
    5. Sometimes: bypass any protection that prevent to install another ROM !
    6. Finally install the ROM’s, boot loader etc…












  • If the computer of the Visitor is already compromised ! your simulation can stop there I think...

    My scenario assume that the visitor computer is not compromised.

    But let say his traffic get intercepted. Sure a hacker can send his PubKey (2) but in (3) the visitor (should) have already the PubKey of one (or few) verification server. So it should not be possible for an hacker to interfer with the communication (3) right ?


  • *removed externally hosted image*

    and what about something like this.

    1. The visitor connect on the website
    2. he receive the public key
    3. The key ( it's hash ) is compared with at least two "verification" server , if they all return a positive match, the visitor can use the pub key to initiate.

    The "verification servers" grab the public key directly from the Web server.

    Any suggestions, ideas ?