@GossiTheDog it seems they don't care because I assume it's a nice chunk of revenue.

@lance @GossiTheDog Exactly the opposite. Malware prevention is one of their major spend sectors in the ad space.

The scale of difficulty of the problem is astronomical. Consider that you can tune an ad to spearphish a target demographic, then you can tune the server response so it only vends the malware payload if the requester sends a request that is fingerprinting correctly to look like the target. Damn near undetectable, even with the techniques Google uses to try and fool malware delivery machines.

The solutions to this problem would be significantly more invasive (such as Google proxying request traffic through their servers to confirm that sites look like they looked when the Google validation checkers requested the page).

@mtomczak @GossiTheDog interesting, makes sense.

Also... I don't pretend to have the answer. I have enough difficulty with my own home lab traffic and scanners/pen tests on my own domains (only 2, and it's overwhelming!).

I feel a little bit of safety that everything behind reverse proxy with only 443 open, but its still worrisome.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.