Hacker News .hnnew | past | comments | ask | show | jobs | submit | dveditz_'s commentslogin

The "exposing information about..." bit in the Mozilla statement is fingerprinting/privacy argument like WebKit's


Maybe? I read that as more of a compatibility thing; if sites depend on information that Chrome exposes, then it's easy for them to have bugs on browsers that don't expose the exact same information (possibly by way of that information not even existing or making sense for a different implementation).


Removed MNG and started work on APNG 20 years ago! https://bugzilla.mozilla.org/show_bug.cgi?id=257197


It supports JavaScript when used as a document, but when used as an "image" by a browser (IMG tag, CSS features) JavaScript and the loading of external resources are disabled.


The capabilities are already expanded in most common implementations. This update is largely blessing those features as officially "standard".


It's not a "goal", it's a requirement (right there in the name!). Failing to comply to a government requirement subjects you to the associated penalties. They haven't said which requirement (we assume it's Russia Sanctions, of course), but their lawyers must have determined that the penalties would apply to them.


This doesn't involve financial transactions with Russian company or rendering of services for a Russian company.


We are not aware of any such thing. As rebelwebmaster noted, when we know that we put it in our advisory.

Clearly the vulnerabilities are exploitable as demonstrated by Manfred Paul's winning Pwn2Own entry. The details were disclosed only to Zero Day Initiative staff (the contest organizers) and Mozilla. They have not been discovered on any website in the wild.


Tails has updated their advisory to remove that statement: https://tails.boum.org/security/prototype_pollution/index.en...


Perhaps Tails copy/pasted the page from an older notice?

Although the two patches have now been public for ~6 days at this point.


Who are "we" here?


Judging by the post and the user's post history, almost certainly 'we' refers to Mozilla.


Post history suggested at best ex- Mozilla to me.


Did the execs get raises after the layoffs? About half the ones that were at Mozilla at that time are gone now.


Or you just turn it off in the normal preference UI and trust that California's AG will sue Mozilla into oblivion if they weren't honoring the CCPA.

https://blog.mozilla.org/netpolicy/2019/12/31/bringing-calif...


Those are in no way substitutes for each other -- you have to do both. People are not able to self-report accurate measurement data, and telemetry data can't tell you anything about what a person wants or why they do things.


How to know when unrelated domains are actually part of the same site is a hard problem. The Public-suffix List approach works okay-ish for cookies, but no one's really happy enough with it to trust for riskier features, and it doesn't help organizations with multiple names (apple.com and icloud.com, google.com and youtube.com, facebook.com and fb.com, etc). As that example list shows at least two major browser vendors have a vested interest in making this work while preserving security.

One conversation-starter folks are discussing is https://github.com/mikewest/first-party-sets


Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: