The following warnings occurred: | |||||||||||||||
Warning [2] Undefined property: MyLanguage::$archive_pages - Line: 2 - File: printthread.php(287) : eval()'d code PHP 8.2.13 (Linux)
|
Cent Browser 3.0.4.29(for Windows) Released - Printable Version +- CentBrowser Forum (https://www.centbrowser.net/en) +-- Forum: Product Related (https://www.centbrowser.net/en/forumdisplay.php?fid=1) +--- Forum: Release Channel (https://www.centbrowser.net/en/forumdisplay.php?fid=2) +--- Thread: Cent Browser 3.0.4.29(for Windows) Released (/showthread.php?tid=1793) |
RE: Cent Browser 3.0.4.29(for Windows) Released - Admini - 01-11-2018 (01-11-2018, 11:08 AM)David Wrote: I found a new problem, when I use the browser to watch Twitch live, there will be a certificate error, then when using Google Chrome does not appear this error We can't reproduce this issue on our side, please check your extensions.(especially ad blocker) RE: Cent Browser 3.0.4.29(for Windows) Released - Admini - 01-11-2018 (01-11-2018, 12:28 PM)reactor Wrote: http://xlab.tencent.com/special/spectre/spectre_check.html We already knew it. You can change "chrome://flags/#shared-array-buffer" to "Disabled" to bypass the test. RE: Cent Browser 3.0.4.29(for Windows) Released - reactor - 01-11-2018 (01-11-2018, 04:19 PM)CentBrowser Wrote: We already knew it. This only would stop a Javascript based attack. https://repl.it/repls/DeliriousGreenOxpecker If you can read the letter "The Magic Words are Squeamish Ossifrage." it means that theorically any website can steal your complete browser session with a few javascript. You log into your bank account, then you visit a rogue website = your credentials are stolen. The other bug, Spectre, involves two known attack strategies so far, and is far more difficult to patch. (And in fact, it may be impossible to defend against it entirely in the long term without updating hardware.) https://www.wired.com/story/meltdown-and-spectre-vulnerability-fix/ RE: Cent Browser 3.0.4.29(for Windows) Released - main user - 01-12-2018 When you plan to exit stably version 3.1...? RE: Cent Browser 3.0.4.29(for Windows) Released - Admini - 01-12-2018 (01-12-2018, 05:31 AM)main user Wrote: When you plan to exit stably version 3.1...? Maybe in three days. RE: Cent Browser 3.0.4.29(for Windows) Released - karserasl - 01-15-2018 (01-11-2018, 04:45 PM)reactor Wrote: This only would stop a Javascript based attack. Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable. If you want to check your PC, then download the code, compile it and run it on your system. Second, we actually need a new update ASAP. https://xlab.tencent.com/special/spectre/spectre_check.html Confirms that Cent is vulnerable. RE: Cent Browser 3.0.4.29(for Windows) Released - reactor - 01-16-2018 (01-15-2018, 06:10 PM)karserasl Wrote: Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable. https://www.grc.com/inspectre.htm RE: Cent Browser 3.0.4.29(for Windows) Released - vladbsid - 01-17-2018 When will the stable version 3.1.x.xx come out? RE: Cent Browser 3.0.4.29(for Windows) Released - user_99 - 01-17-2018 (01-15-2018, 06:10 PM)karserasl Wrote: Ok, first of all, that script running will just check if the LOCAL system is vulnerable. That means the server that is running the script is vulnerable. With setting the flags this link show $ Your browser is NOT VULNERABLE to Spectre RE: Cent Browser 3.0.4.29(for Windows) Released - AHMD - 01-17-2018 NEW VERSION WHEN? THANKS |