by jakeogh on 12/30/24, 9:18 AM with 111 comments
by cle on 12/30/24, 1:34 PM
I can't help but feel like these are the dying breaths of the open Internet though. All the megacorps (Google, Microsoft, Apple, CloudFlare, et al) are doing their damndest to make sure everyone is only using software approved by them, and to ensure that they can identify you. From multiple angles too (security, bots, DDoS, etc.), and it's not just limited to browsers either.
End goal seems to be: prove your identity to the megacorps so they can track everything you do and also ensure you are only doing things they approve of. I think the security arguments are just convenient rationalizations in service of this goal.
by oefrha on 12/30/24, 1:51 PM
by jandrese on 12/30/24, 5:42 PM
Ultimately I was not able to get it to build because the BoringSSL disto it downloaded failed to build even though I made sure all of the dependencies the INSTALL.md listed are installed. This might be because the machine I was trying to build it on is an older Ubuntu 20 release.
Edit: Tried it on Ubuntu 22, but BoringSSL again failed to build. The make script did work better however, only requiring a single invocation of make chrome-build before blowing up.
Looks like a classic case of "don't ship -Werror because compiler warnings are unpredictable".
Died on:
/extensions.cc:3416:16: error: ‘ext_index’ may be used uninitialized in this function [-Werror=maybe-uninitialized]
The good news is that removing -Werror from the CMakeLists.txt in BoringSSL got around that issue. Bad news is that the dependency list is incomplete. You will also need libc++-XX-dev and libc++abi-XX-dev where the XX is the major version number of GCC on your machine. Once you fix that it will successfully build, but the install process is slightly incomplete. It doesn't run ldconfig for you, you have to do it yourself.
On a final note, despite the name BoringSSL is huge library that takes a surprisingly long time to build. I thought it would be like LibreSSL where they trim it down to the core to keep the attack surface samll, but apparently Google went in the opposite direction.
by zlagen on 12/30/24, 12:59 PM
by Sytten on 12/30/24, 3:30 PM
by Retr0id on 12/30/24, 1:07 PM
by peetistaken on 12/30/24, 12:41 PM
by kerblang on 12/30/24, 7:46 PM
by TekMol on 12/30/24, 1:23 PM
When I have to do HTTP requests these days, I default to a headless browser right away, because that seems to be the best bet. Even then, some website are not readable because they use captchas and whatnot.
by jollyllama on 12/30/24, 1:27 PM
Why is this?
by 0x676e67 on 1/2/25, 2:30 PM
by jakeogh on 12/31/24, 8:51 AM
by userbinator on 12/30/24, 11:47 PM
The following browsers can be impersonated.
...unfortunately no Firefox to be seen.
I've had to fight this too, since I use a filtering proxy. User-agent discrimination should be illegal. One may think the EU could have some power to change things, but then again, they're also hugely into the whole "digital identity" thing.
by aninteger on 12/30/24, 2:32 PM
by londons_explore on 12/30/24, 12:34 PM
How close is it? If I ran wireshark, would the bytes be exactly the same in the exact same packets?
by ape4 on 12/30/24, 1:58 PM
Is there a way to request impersonization of the current version of Chrome (or whatever)?