- Markdown style
[](https://youtu.be/nTQUwghvy5Q)- HTML style
<a href="http://www.youtube.com/watch?feature=player_embedded&v=nTQUwghvy5Q" target="_blank">| // This injects a box into the page that moves with the mouse; | |
| // Useful for debugging | |
| async function installMouseHelper(page) { | |
| await page.evaluateOnNewDocument(() => { | |
| // Install mouse helper only for top-level frame. | |
| if (window !== window.parent) | |
| return; | |
| window.addEventListener('DOMContentLoaded', () => { | |
| const box = document.createElement('puppeteer-mouse-pointer'); | |
| const styleElement = document.createElement('style'); |
| import Blockly from 'blockly'; | |
| declare interface CustomNode extends Node { | |
| removeAttribute(arg0: string); | |
| } | |
| const DOMURL = window.URL || window.webkitURL; | |
| const getSvgBlob = (workspace: Blockly.WorkspaceSvg) => { | |
| const canvas = workspace.svgBlockCanvas_.cloneNode(true) as CustomNode; |
hi, i'm daniel. i'm a 15-year-old high school junior. in my free time, i hack billion dollar companies and build cool stuff.
3 months ago, I discovered a unique 0-click deanonymization attack that allows an attacker to grab the location of any target within a 250 mile radius. With a vulnerable app installed on a target's phone (or as a background application on their laptop), an attacker can send a malicious payload and deanonymize you within seconds--and you wouldn't even know.
I'm publishing this writeup and research as a warning, especially for journalists, activists, and hackers, about this type of undetectable attack. Hundreds of applications are vulnerable, including some of the most popular apps in the world: Signal, Discord, Twitter/X, and others. Here's how it works:
By the numbers, Cloudflare is easily the most popular CDN on the market. It beats out competitors such as Sucuri, Amazon CloudFront, Akamai, and Fastly. In 2019, a major Cloudflare outage k