"Your userhashes have been rotated due to a security incident. Log into your account and go to "Manage Account" to find your new userhash. More information will be available soon."
Not sure if this has been discussed, I was offline most of yesterday.
Closest thing I found to it:
https://www.voat.xyz/viewpost.php?postid=60f8c14ee9158
[ + ] try
[ - ] try 2 points 3.8 yearsJul 22, 2021 16:26:16 ago (+2/-0)*
====================
Extremely suspicious activities today from catbox after being down for those 12 hours, and requiring new account credentials.
Catbox is now suddenly sending illegal jpg malformed byte streams.
I never once in history got a possible zer0-day fake jpg masquerading as a webP UNTIL HOURS AGO!!!!!!
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!! New July 21 2021 zero day revealed!
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!! New July 21 2021 zero day revealed!
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!! New July 21 2021 zero day revealed!
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!!
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!!
Proof?
https://www.voat.xyz/viewpost.php?postid=60f99d41cf62e
WebP has again and again every year, including last summer, been used to exploit Windows 10 computers remotely. Last Summer again!!!!
And two defects on All macs and iOS including one in May and a 0-day revealed today July 21 2021, AFTER catbox.moe 12 hour mystery outtage and then mysteriously started sending malformed webP.
JPG and PNG have had almost no remote exploits since 2012, unlike the deep state spooks exploiting WebP.
I have no doubt WebP has more unrevealed CIA zer0-days in it.
August 2020 :
Microsoft Windows WebP Image Extention RCE (August 2020) :
https://www.tenable.com/plugins/nessus/140596
If you had your browser set to broadcast lack of support for WebP shit, you were safe all through 2020.
July 21 2021? Yep more explotable defects for macintosh too :
https://vulners.com/zdi/ZDI-21-893
That revelation from anonymous on July 22 2021 , half a day ago, is UNPATCHED ON ALL MACS using latest safari !!!!
And its already been leveraged by CIA/FBI/MOSSAD all last month.
In May 2021 another defect on Macs : "ZDI-21-598" discovered suing fuzzing tools that repair internal checksums after fuzz.
https://en.wikipedia.org/wiki/Fuzzing
*I TRIED TO WARN YOU GOATS, but JIDF shills here want my info suppressed!
=========
And its only known on this site here, voat.xyz, and wherever I deem worthy to warn cyber-punks like vulners.com
Servers swapping byte streams from jpg to mystery files is dangerous... it is how .exe files, .pdf zero days, and similar payloads can get delivered into target machines.
The CIA/FBI has no doubt COUNTLESS remote exploit zero-day ways to hack citizens using the mammoth over-engineered JPEG XR file container :
https://en.wikipedia.org/wiki/JPEG_XR but to get a target suspect to open and decode a JPEG XR requires them to be tricked into accepting a WebP (https://en.wikipedia.org/wiki/WebP)
In my Firefox I have set all thee spots to force unacceptance of Webp shit files :
[refer to PART 2 of post (it would not post) : in self reply :]
[ + ] try
[ - ] try 0 points 3.8 yearsJul 22, 2021 19:45:32 ago (+0/-0)*
about:config, remove "image/webp," from image.http.accept
[ + ] try
[ - ] try 0 points 3.8 yearsJul 22, 2021 19:47:07 ago (+0/-0)
in about:config remove "image/webp," from network.http.accept.default.
third step (most drastic) :
also in about:config set "FALSE" image.webp.enabled
"silent image swap to WebP" was a foolish feature of saving bytes on Reddit.com, but webp and its DRM nonsense and user tracking salted internal data, needs to be banned.
Normally in 2021 , image.webp.enabled is set True for kikery, and normally in 2021 image.http.accept and network.http.accept.default allow this abomination.
The FBI and CIA are having non stop celebrations over all the WebP remote exploits they leverage to root machines!
WebP fake jpg links on voat should be banned if mislabeled! Automatic deletion! Its a tool of the Glowniggers in 2021.
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!!
[ + ] try
[ - ] try 0 points 3.8 yearsJul 22, 2021 19:47:39 ago (+0/-0)*
~~~
in about:config remove
"image/webp," from network.http.accept.default.
~~~
[ + ] try
[ - ] try 0 points 3.8 yearsJul 22, 2021 19:48:19 ago (+0/-0)*
~~~
third step (most drastic) :
also in about:config set "FALSE" image.webp.enabled
"silent image swap to WebP" was a foolish feature of saving bytes on Reddit.com, but webp and its DRM nonsense and user tracking salted internal data, needs to be banned.
Normally in 2021 , image.webp.enabled is set True for kikery, and normally in 2021 image.http.accept and network.http.accept.default allow this abomination.
The FBI and CIA are having non stop celebrations over all the WebP remote exploits they leverage to root machines!
WebP fake jpg links on voat should be banned if mislabeled! Automatic deletion! Its a tool of the Glowniggers in 2021.
~~~
CATBOX SUDDENLY BEING USED TO SEND MALFORMED JPGS!!!
[ + ] Hadza
[ - ] Hadza 0 points 3.8 yearsJul 22, 2021 21:18:41 ago (+0/-0)
[ + ] oldblo
[ - ] oldblo 1 point 3.8 yearsJul 22, 2021 13:53:17 ago (+1/-0)
[ + ] mikenigger
[ - ] mikenigger 1 point 3.8 yearsJul 22, 2021 13:10:42 ago (+1/-0)
it was mentioned in some post titles: https://www.voat.xyz/viewpost.php?postid=60f84c36c4fb5
[ + ] KCobain27
[ - ] KCobain27 [op] 0 points 3.8 yearsJul 22, 2021 13:51:55 ago (+0/-0)
[ + ] mikenigger
[ - ] mikenigger 0 points 3.8 yearsJul 22, 2021 14:20:10 ago (+0/-0)*
[ + ] v0atmage
[ - ] v0atmage 0 points 3.8 yearsJul 22, 2021 14:07:50 ago (+0/-0)