this post was submitted on 23 Sep 2023
514 points (95.6% liked)

Memes

45923 readers
1493 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] 7heo@lemmy.ml 57 points 1 year ago* (last edited 1 year ago) (6 children)
[–] hai@lemmy.ml 14 points 1 year ago (1 children)

Fair point, I made the meme to be silly, and, yes, this is one of the many reasons why tokens in general should expire after some point in time.

Also the meme isn’t wrong, memes don’t need logic, they’re supposed to give people a giggle.

[–] 7heo@lemmy.ml 7 points 1 year ago* (last edited 1 year ago) (1 children)
[–] hai@lemmy.ml 0 points 1 year ago (1 children)

To be Frank, who I am not (I'm Hai), I can't tell if you're a troll or not. Although, if you're not, my meme is not "wrong" or spreading misinformation it contains a logical fallacy, as many jokes do. I can list jokes that contain logical fallacies upon request.

[–] 7heo@lemmy.ml 5 points 1 year ago* (last edited 1 year ago) (1 children)

Bruh, pointing out that "you're spreading out misinformation as a joke" isn't trolling. I'd recommend going out to touch grass, but given how thin your skin is, I am afraid you're at aggravated risks of third degree burns from the slightest sun exposure, even during a cloudy day. So I'll recommend for you to wear a thick coat and go see a dermatologist instead.

P.S.: nice pun, I loled.

[–] hai@lemmy.ml 2 points 1 year ago

This was the funniest thing I read all day, thank you. Sorry for misunderstanding your tone.

[–] NightAuthor@lemmy.world 9 points 1 year ago (1 children)

Look at this guy over here, nerding out about the WiFi.

Jk, glad to find someone in the comments correcting the misinformation in the meme. OP is probably a hacker who likes to do session hijacking.

[–] hai@lemmy.ml 3 points 1 year ago

Not a hacker, just a silly goofball.

[–] redcalcium@lemmy.institute 5 points 1 year ago (1 children)

JWT sounds great on paper until you have to deal with logout and revocations. Might as well use standard session cookies.

[–] 7heo@lemmy.ml 4 points 1 year ago

It is a great idea, but like most implementations using cryptography in new applications with novel concepts (like cryptocurrencies), it's half assed, and people are so eager to release and use it that they forego any simulation, testing and staging of their design; so we only get to find about any shortcomings, inefficiencies, or even design mistakes, once said tech has become big and popular (and consequently, a pain to fix and patch).

[–] joucker29@lemmy.ml 3 points 1 year ago

Fr my thoughts exactly

[–] tdawg@lemmy.world 2 points 1 year ago (1 children)

And what happens next time they load the site?

[–] 7heo@lemmy.ml 3 points 1 year ago* (last edited 1 year ago) (2 children)

If the cookie was saved in any way (maliciously or not: session hijacking, restored backup, etc), they are logged in. That's exactly the problem, thanks for pointing it out.

If they had "logged off" (or closed the session), no amount of cookie resurrection would log them back in: the server would refuse that cookie session the same way it would refuse an expired password.

[–] Catweazle@social.vivaldi.net 1 points 1 year ago (1 children)

@7heo @tdawg, i only keep data from sites which i visit every day, no other, using Site Bleacher, it remove automatically cookies, local storages, IndexedDBs, service workers, cache storages, filesystems and webSQLs from all not whitelisted sites. This keeps clean the browser and HD.

https://github.com/wooque/site-bleacher

Similar alternative

https://github.com/Cookie-AutoDelete/Cookie-AutoDelete

[–] 7heo@lemmy.ml 4 points 1 year ago* (last edited 1 year ago)

Yeah, so lemme show you a few tools since we're on the topic of sharing.

  1. Find the tool that tickles your fancy here or here.
  2. Find a target (for this part I won't be giving any links).
  3. Once you have access to your target, run your file recovery tool (winfr, testdisk, etc).
  4. Bring back any and all cookies.
  5. Exfiltrate them using twitter, github, email, whatever.
  6. Congratulations, you now have access to all the (not yet expired) sessions (i.e. accounts) your target ever used, because they follow(ed) the recommendations in the meme of OP and in your comment.

Please log out from apps and websites!

[–] SnipingNinja@slrpnk.net 1 points 1 year ago (1 children)

What about incognito sessions?

[–] 7heo@lemmy.ml 1 points 1 year ago* (last edited 1 year ago) (1 children)
[–] SnipingNinja@slrpnk.net 2 points 1 year ago

Yeah, that's what I was curious about, the security issues you mentioned as I wasn't clear in my understanding until now. Thanks.

[–] 4am@lemm.ee 1 points 1 year ago (1 children)

Yeah you really should do both. Some session cookies can just be used as tracking cookies later.

[–] 7heo@lemmy.ml 1 points 1 year ago* (last edited 1 year ago)

Just start with closing the session, eh? Otherwise the app won't know what session to close.

And hopefully when the session is destroyed on the server, the app also deletes the client cookie. Assuming there will never be any server bugs, so that keeping the previous SessionIDs around on the client is "no problem", sounds like your average "famous last words" occurrence.