Krippenreiter Profile picture
Apr 30 β€’ 14 tweets β€’ 9 min read Twitter logo Read on Twitter
⚠️ A browser extension is always a double-edged sword.

In general, there isn't much to disagree with in what @panosmek has written in this fantastic thread, but here are few additional thoughts:

πŸ§΅πŸ‘‡ [1/13]
[2/13] Browser extensions in and of themselves can easily be the source of #exploits.

So, rather than securing your #browser session, increasing your #privacy, or acting as a warning tool before signing transactions, it may turn out to be your worst enemy.
[3/13] β€” Attack Vectors β€”

🧐 There are merely two malicious concepts that will be exploited by #hackers to harm you while using #browser extensions:

πŸ”Έ Supply-Chain attack
πŸ”Έ Man-in-the-middle attack
[4/13] β€” 1⃣ Supply-Chain Attack β€”

Supply-Chain attacks are a threat that targets software DEVs and providers.

The objective is to get access to source codes, build processes, or update mechanisms through infecting legitimate programs in order to distribute #malware Source: https://www.bleepin...
[5/13] β€” 2⃣ Supply-Chain Attack β€”

In the case of #browser extensions, this means that the #hacker will tamper somewhere along the line of delivering updates or installing the extensions.

As an example, look at the following:
πŸ”— wordfence.com/blog/2017/08/c… Source: https://www.enisa.e...
[6/13] β€” 3⃣ Supply-Chain Attack β€”

Another unfortunate example is when DEVs sell their extension product to other firms without informing you.

They may then decide to spread #malware or spy on you, and they may not have your best interests at heart.

πŸ”— theregister.com/2021/01/07/gre…
[7/13] β€” 1⃣ Man-In-The-Middle Attack β€”

#MITM, which is used in combination with the supply chain attack, is the fact that the suspicious actor intercepts your #browser internet traffic.

In most situations, this is used to eavesdrop on or tamper with your network data. Source: https://www.malware...
[8/13] β€” 1⃣ Solutions β€”

In general, #browser providers have safeguards in place to protect users from these kind of browser #extension attacks, so don't worry, they're not as widespread as you may assume.

Nonetheless, I would never suggest using any browser extension.
[9/13] β€” 2⃣ Solutions β€”

In general, when actively using a #wallet, you must be aware that a single incorrectly signed TX will probably drain your whole wallet.

Hence, my 1st advice is:

πŸ”Έ For heavy activity, use hot #wallets
πŸ”Έ For #EVM-based NFTs, use burner wallets
[10/13] β€” 3⃣ Solutions β€”

Transferring low-value TXs initially is always suggested before moving larger amounts.

But please don't let this distract you from the reality that #vulnerabilities can be engineered to trigger only when specific parameters (values) are satisfied. πŸ˜…
[11/13] β€” 4⃣ Solutions β€”

If you don't want to abandon #browser extensions, use them only to "check" the TX intent within a constrained environment known as a virtual machine.

"Checking" may be done quickly and easily with:
[1] sandboxie-plus.com
[2] github.com/sandboxie-plus/
[12/13] β€” 5⃣ Solutions β€”

The actual signature for the requested TX should only be submitted on a new operating system and browser.

As a result, my final advice is:

πŸ”Έ Purchase and utilize a #hardwarewallet.
πŸ”Έ Purchase and use a dedicated laptop.
πŸ”Έ Install no #extensions.
[13/13] I hope you appreciated this 🧡 that sheds some light on some of the negative aspects of browser extensions. πŸ˜…

Please follow me here:
@krippenreiter πŸ™

Feel free to contribute by sharing here: πŸ‘‡

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Krippenreiter

Krippenreiter Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @krippenreiter

Apr 24
[1/🧡] An easy step-by-step guide for utilizing a #Ledger hardware wallet to configure @BifrostWallet as an #autoclaim executor on the #Songbird (#SGB) network.

To learn more, keep on reading and complete the steps. (πŸ˜… Warning: paranoia ahead.) πŸ§΅πŸ‘‡ Source: https://docs.flare....
[2/20] β€” What is the primary goal? β€”

The basic purpose of an executor address is to claim rewards on your behalf in order to save time, max. compound interest, & reduce unwanted exposure of a cold wallet.

Executors will then use auto. claiming to route rewards to your acc. πŸ‘ Source: https://docs.flare....
[3/20] β€” 1⃣ Is it safe to assign the task to an executor? β€”

The executor cannot claim to any address other than the one provided by the user, therefore automatic claiming is secure. πŸ’ͺ
. . .
Read 21 tweets
Apr 16
[1/🧡] β€” #DCMA / #Unicoin / #UMU & the future of #Crypto & #CBDC β€”

Let's look through the website and conduct some research before leaping to conclusions. 🧐

πŸ”Έ Did the #IMF make any comments regarding #DCMA?
πŸ”Έ Will this be the end of #XRP?

Let's find out in this πŸ§΅πŸ‘‡ Source: https://dcma.io/ima...
[2/16] The Digital Currency Monetary Authority is making moves and expanding its reach through Twitter with its Unicoin network and #UMU, the native Unicoin.

ℹ️ Who are they and what do they offer? Source: https://dcma.io/ima...
[3/16] β€” ℹ️ β€” 1⃣ #DCMA & #Unicoin β€”
πŸ”Έ Founder working on Unicoin since 2013, yet LinkedIn says 2018
πŸ”Έ Just 2 employees
πŸ”Έ They refer to themselves as a business, yet there is no registered corporate structure Source: https://unicoinnetw...Source: https://www.linkedi...Source: https://www.linkedi...
Read 17 tweets
Mar 28
1/ To be honest, I'm having a hard time comprehending this one, but I came up with a simple example that could help. 🧡

@woj4ke Please correct me if I am incorrect.

I'll probably delete this later if it doesn't make sense.
2/ Assume I develop a #decentralized gaming app (L2-Smart Contract) with 10 nodes hosted all over the world to be redundant and reliable while processing #smartcontract data in the #network.

➑️ The purpose of this #game is to walk from the starting point to the finish line.
3/ On the players route to the finish line, there are rocks to leap over.

After successfully leaping over a rock, a #transaction on the #dApp gets crafted, granting the player 1 issued #Token labeled "JUMP".
Read 13 tweets
Mar 26
[1/🧡] A short synopsis of Joachim Nagel's most recent speech on the future of #economic and #monetary union, presented and released by @OMFIF (@OMFIFDMI). πŸ‘‡

[2/7] Joachim Nagel, a member of the @bundesbank's Executive Board, discusses:
πŸ”Έ #Inflation
πŸ”Έ #Monetary policy
πŸ”Έ #Fiscal development, ...

... among other topics.
[3/7] According to Nagel, the ongoing #energy #crisis in #Ukraine has resulted in:
πŸ”Έ Greater #inflation
πŸ”Έ Higher #energy prices ...

... influencing:
πŸ”Έ #Industrial costs
πŸ”Έ #Financial insecurity.
Read 8 tweets
Mar 19
[1/🧡] "#ISO20022 is bigger than you think"

You've probably heard that term a few times and wondered what it meant. πŸ€”

In case you are curious now:

A brief explanation of everything important.
There will be nothing complicated ahead, so don't worry. πŸ§΅πŸ‘‡ Source: https://topiacoin.io/es/cbpr-iso-20022-for-dummies/
[2/24] β€” Outline β€”

πŸ”Ή Origin & Timeline
πŸ”Ή What's the big deal?
πŸ”Ή Details regarding the transformation
πŸ”Ή Migration Approaches
πŸ”Ή Relations to #Crypto (#DTI)
πŸ”Ή @Ripple & #JSON formats Source: https://www.cryptopolitan.com/iso-20022-compliant-cr
[3/24] β€” Origin & Timeline β€”

The #ISO 20022 standardization efforts began very early on. Indeed, you may be wondering how you missed it until this date. πŸ˜… Source: https://www.slideserve.com/bevis/iso-20022-unifi-pow
Read 26 tweets
Mar 15
[1/🧡] I believe @bob_way has already gone way overboard with #ILP and all the complexities of explaining all that needs to be expressed. ❀️

Still, let me make a few remarks on the following topics πŸ‘‡
β€’ Infrastructure layers of #ILP
β€’ #XRPL Payment Channels
β€’ "Ledger Graphs"
[2/17] β€” Infrastructure Layers of #Interledger β€”

When it comes to the most recent version of the open #ILPv4 suite in universal mode (high volume, low value payments), the layering is as follows:

1⃣ Application
2⃣ Transport
3⃣ Interledger (Core Layer)
4⃣ Link
5⃣ Ledger
[3/17] β€” 1⃣ Application Layer β€”

This is the suite's first layer, and it contains the following protocol:
➑️ #SPSP (Simple Payment Setup Protocol)

πŸ“ This is for #identifiers, which are comparable to email addresses and are used to make addresses readable.
Read 18 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(