Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Cent Browser 3.0.4.29(for Windows) Released
#21
(01-11-2018, 11:08 AM)David Wrote: I found a new problem, when I use the browser to watch Twitch live, there will be a certificate error, then when using Google Chrome does not appear this error

We can't reproduce this issue on our side, please check your extensions.(especially ad blocker)
Reply
#22
(01-11-2018, 12:28 PM)reactor Wrote: http://xlab.tencent.com/special/spectre/...check.html

We already knew it.
You can change "chrome://flags/#shared-array-buffer" to "Disabled" to bypass the test.
Reply
#23
(01-11-2018, 04:19 PM)CentBrowser Wrote: We already knew it.
You can change "chrome://flags/#shared-array-buffer" to "Disabled" to bypass the test.

This only would stop a Javascript based attack.


https://repl.it/repls/DeliriousGreenOxpecker
If you can read the letter "The Magic Words are Squeamish Ossifrage." it means that theorically any website can steal your complete browser session with a few javascript. You log into your bank account, then you visit a rogue website = your credentials are stolen.



The other bug, Spectre, involves two known attack strategies so far, and is far more difficult to patch. (And in fact, it may be impossible to defend against it entirely in the long term without updating hardware.)
https://www.wired.com/story/meltdown-and...ility-fix/

Sad
Reply
#24
When you plan to exit stably version 3.1...?
Reply
#25
(01-12-2018, 05:31 AM)main user Wrote: When you plan to exit stably version 3.1...?

Maybe in three days.
Reply
#26
(01-11-2018, 04:45 PM)reactor Wrote: This only would stop a Javascript based attack.


https://repl.it/repls/DeliriousGreenOxpecker
If you can read the letter "The Magic Words are Squeamish Ossifrage." it means that theorically any website can steal your complete browser session with a few javascript. You log into your bank account, then you visit a rogue website = your credentials are stolen.



The other bug, Spectre, involves two known attack strategies so far, and is far more difficult to patch. (And in fact, it may be impossible to defend against it entirely in the long term without updating hardware.)
https://www.wired.com/story/meltdown-and...ility-fix/

Sad

Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable.
If you want to check your PC, then download the code, compile it and run it on your system.

Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre...check.html Confirms that Cent is vulnerable.
Reply
#27
(01-15-2018, 06:10 PM)karserasl Wrote: Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable.
If you want to check your PC, then download the code, compile it and run it on your system.

Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre...check.html Confirms that Cent is vulnerable.

https://www.grc.com/inspectre.htm
Reply
#28
When will the stable version 3.1.x.xx come out?
Reply
#29
(01-15-2018, 06:10 PM)karserasl Wrote: Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable.
If you want to check your PC, then download the code, compile it and run it on your system.

Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre...check.html Confirms that Cent is vulnerable.

With setting the flags this link show $ Your browser is NOT VULNERABLE to Spectre
Reply
#30
NEW VERSION
WHEN?
THANKS
Reply


Forum Jump:


Users browsing this thread: 2 Guest(s)