+ Reply to Thread
Page 2 of 3 FirstFirst 123 LastLast
Results 16 to 30 of 32

Thread: Which Browsers Are The Most Secure?

  1. #16
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by king.stillwill View Post
    I'm using FireFox 1.5.0.4
    You're using a very old piece of software last updated in mid-2006. It's time to upgrade.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  2. #17
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss581
    Netscape's results:

    1. FAIL postMessage API
    2. FAIL JSON.parse API
    3. FAIL toStaticHTML API
    4. PASS httpOnly cookie API
    5. FAIL X-Frame-Options
    6. FAIL X-Content-Type-Options
    7. FAIL Block reflected XSS
    8. PASS Block location spoofing
    9. FAIL Block JSON hijacking
    10. PASS Block XSS in CSS
    11. FAIL Sandbox attribute
    12. FAIL Origin header
    13. FAIL Strict Transport Security
    14. FAIL Block cross-origin CSS attacks
    15. FAIL Content Security Policy
    16. FAIL Cross Origin Resource Sharing
    17. FAIL Block visited link sniffing
    Reply With QuoteReply With Quote
    Thanks

  3. #18
    Member illusive's Avatar
    Join Date
    24.10.10
    P2P Client
    What ?! That's Private!
    Posts
    510
    Activity Longevity
    2/20 16/20
    Today Posts
    0/5 ssssss510
    Quote Originally Posted by anon View Post
    You're using a very old piece of software last updated in mid-2006. It's time to upgrade.
    Well, there was many addons working with this version but after your advice I've upgraded to 3.6.12. So Results are:

    1. PASS postMessage API
    2. PASS JSON.parse API
    3. FAIL toStaticHTML API
    4. PASS httpOnly cookie API
    5. PASS X-Frame-Options
    6. FAIL X-Content-Type-Options
    7. FAIL Block reflected XSS
    8. PASS Block location spoofing
    9. PASS Block JSON hijacking
    10. PASS Block XSS in CSS
    11. FAIL Sandbox attribute
    12. FAIL Origin header
    13. FAIL Strict Transport Security
    14. PASS Block cross-origin CSS attacks
    15. FAIL Content Security Policy
    16. PASS Cross Origin Resource Sharing
    17. FAIL Block visited link sniffing
    Reply With QuoteReply With Quote
    Thanks

  4. #19
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by king.stillwill View Post
    Well, there was many addons working with this version
    You can edit the XPI file so that they'll accept the new Firefox version, and possibly, work.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  5. Who Said Thanks:

    illusive (24.11.10)

  6. #20
    Advanced User Renk's Avatar
    Join Date
    17.08.08
    Location
    Elsewhere
    P2P Client
    utorrent
    Posts
    581
    Activity Longevity
    0/20 19/20
    Today Posts
    0/5 ssssss581
    Quote Originally Posted by king.stillwill View Post
    Well, there was many addons working with this version but after your advice I've upgraded to 3.6.12. So Results are:
    With your addons ?

    Maybe it would be interesting to do the test with a new FF profile, without any addons.
    Reply With QuoteReply With Quote
    Thanks

  7. #21
    Quote Originally Posted by Instab View Post
    also the test requires js which i have disabled by default normally
    what about all those javascript heavy sites now-a-days? you just dont visit them or...?
    Last edited by Sazzy; 09.01.11 at 19:10.
    g̺̗͙̺l̜̜i͖̦͇̙t͕̲̜c͇̮͕̺̩͎̰̜h͕̦̘
    Reply With QuoteReply With Quote
    Thanks

  8. #22
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    He probably enables JavaScript on a whitelist-like basis. Just like I do with both JS itself (NotScripts for Opera) as well as Flash.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  9. #23
    A blacklist i would understand. A whitelist however is too much work imho.
    g̺̗͙̺l̜̜i͖̦͇̙t͕̲̜c͇̮͕̺̩͎̰̜h͕̦̘
    Reply With QuoteReply With Quote
    Thanks

  10. #24
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Quote Originally Posted by Sazzy View Post
    A whitelist however is too much work imho.
    Not quite, once you've browsed enough and added all the broken sites to it.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  11. #25

    Join Date
    12.11.08
    Location
    Europe
    P2P Client
    Nothing ATM
    Posts
    303
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss303
    Using latest ff stable for windows:

    1. PASS postMessage API
    2. PASS JSON.parse API
    3. PASS toStaticHTML API
    4. FAIL httpOnly cookie API
    5. PASS X-Frame-Options
    6. PASS X-Content-Type-Options
    7. PASS Block reflected XSS
    8. PASS Block location spoofing
    9. PASS Block JSON hijacking
    10. PASS Block XSS in CSS
    11. FAIL Sandbox attribute
    12. FAIL Origin header
    13. PASS Strict Transport Security
    14. PASS Block cross-origin CSS attacks
    15. FAIL Content Security Policy
    16. PASS Cross Origin Resource Sharing
    17. PASS Block visited link sniffing
    Reply With QuoteReply With Quote
    Thanks

  12. #26

    Join Date
    17.07.10
    Location
    Hell
    P2P Client
    uSerenity
    Posts
    177
    Activity Longevity
    0/20 16/20
    Today Posts
    0/5 ssssss177
    Code:
    1.PASS postMessage API
    2.PASS JSON.parse API
    3.FAIL toStaticHTML API
    4.PASS httpOnly cookie API
    5.PASS X-Frame-Options
    6.FAIL X-Content-Type-Options
    7.PASS Block reflected XSS
    8.PASS Block location spoofing
    9.PASS Block JSON hijacking
    10.PASS Block XSS in CSS
    11.FAIL Sandbox attribute
    12.FAIL Origin header
    13.FAIL Strict Transport Security
    14.PASS Block cross-origin CSS attacks
    15.FAIL Content Security Policy
    16.FAIL Cross Origin Resource Sharing
    17.FAIL Block visited link sniffing
    Opera 11 Result. Passed at [9/17]
    Reply With QuoteReply With Quote
    Thanks

  13. #27
    Moderator anon's Avatar
    Join Date
    01.02.08
    Posts
    39,439
    Activity Longevity
    8/20 19/20
    Today Posts
    1/5 ssss39439
    Evilmill, I'm using Opera 11 too, and I'm passing points 6 and 17, whereas you do not?

    The last one sounds like related to referers, which you can easily turn off via F12 -> Send Referrer Information. That's a good idea to prevent sites you visit from knowing where you've been, actually.
    "I just remembered something that happened a long time ago."
    Reply With QuoteReply With Quote
    Thanks

  14. Who Said Thanks:

    Evilmill (12.01.11)

  15. #28
    Code:
       
       1. PASS postMessage API
       2. PASS JSON.parse API
       3. PASS toStaticHTML API
       4. PASS httpOnly cookie API
       5. PASS X-Frame-Options
       6. PASS X-Content-Type-Options
       7. PASS Block reflected XSS
       8. PASS Block location spoofing
       9. PASS Block JSON hijacking
      10. PASS Block XSS in CSS
      11. FAIL Sandbox attribute
      12. FAIL Origin header
      13. PASS Strict Transport Security
      14. PASS Block cross-origin CSS attacks
      15. FAIL Content Security Policy
      16. PASS Cross Origin Resource Sharing
      17. PASS Block visited link sniffing
    why not people not write browser version and OS for their testes ?

    ff 3.6.13 xp sp3

    Any idea to fix 11 & 12 & 15 (need to be more secure) ?!!
    Last edited by mmmmm; 11.01.11 at 21:14.
    Busy , new things always comes
    Its the time for personal life ,Still here from time to time, Greeting for everybody All .

    Its easy way to capture the announces :-
    Tutorial how use SmartSniff to Capture announces for Bittorrent
    Reply With QuoteReply With Quote
    Thanks

  16. #29
    Moderator
    Instab's Avatar
    Join Date
    17.09.09
    Posts
    6,661
    Activity Longevity
    4/20 17/20
    Today Posts
    0/5 sssss6661
    Quote Originally Posted by Sazzy View Post
    what about all those javascript heavy sites now-a-days? you just dont visit them or...?
    Quote Originally Posted by anon View Post
    He probably enables JavaScript on a whitelist-like basis. Just like I do with both JS itself (NotScripts for Opera) as well as Flash.
    Quote Originally Posted by Sazzy View Post
    A blacklist i would understand. A whitelist however is too much work imho.
    noscript dös a great job. all off by default and if i feel that a site dösn't work as it should i can enable it with one click. either temp. or perm.
    but i rarely use multimedia stuff and those mentioned fat sites are so much nicer and faster without js
    Your account has been disabled.
    Reply With QuoteReply With Quote
    Thanks

  17. #30

    Join Date
    10.08.09
    Location
    DZ
    P2P Client
    RM
    Posts
    238
    Activity Longevity
    0/20 18/20
    Today Posts
    0/5 ssssss238
    here is my test---->FF 3.6.13--->Win 7 32bit

    Code:
       1. PASS postMessage API
       2. PASS JSON.parse API
       3. FAIL toStaticHTML API
       4. PASS httpOnly cookie API
       5. PASS X-Frame-Options
       6. FAIL X-Content-Type-Options
       7. FAIL Block reflected XSS
       8. PASS Block location spoofing
       9. PASS Block JSON hijacking
      10. PASS Block XSS in CSS
      11. FAIL Sandbox attribute
      12. FAIL Origin header
      13. FAIL Strict Transport Security
      14. PASS Block cross-origin CSS attacks
      15. FAIL Content Security Policy
      16. PASS Cross Origin Resource Sharing
      17. PASS Block visited link sniffing
    7 FAILS :(
    Last edited by ErRor; 11.01.11 at 23:19.
    Reply With QuoteReply With Quote
    Thanks

+ Reply to Thread
Page 2 of 3 FirstFirst 123 LastLast

Tags for this Thread

Posting Permissions

  • You may post new threads
  • You may post replies
  • You may not post attachments
  • You may not edit your posts
  •