this post was submitted on 21 Sep 2024
33 points (97.1% liked)
Home
464 readers
1 users here now
Lemmy.zip instance discussion.
For all things relating to Lemmy.zip.
Main instance rules apply, with the additional rules below:
- This community is intended for Lemmy.zip users only. Comments or posts from external instance users will be removed at the admin's discretion. Repeat offenders will be banned.
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I don't get what's more concerning about the .zip TLD than any other one.
They are just more likely to be scam like, particularly since they can be assumed to be a file at a glance.
Even more deviously, crafty urls like this further hides what you are actually doing, like this:
https://github.com∕kubernetes∕kubernetes∕archive∕refs∕tags∕@v1271.zip
Hover it with your cursor, watch what that actually links too, no markup cheating involved. Anything before the @ is just user information. Imagine clicking that and thinking you downlodaed a tagged build, only to get a malware?
It's not the end of the world, but as a developer it makes great sense to just auto-block it to avoid an incident. The above URL is from this article, which says it's not as big of huge problem too:
https://www.theregister.com/2023/05/17/google_zip_mov_domains/
But it's kind of a death by a thousand cuts to me, because it's another thing with another set of consideration accross the internet ecosystem that one will have to deal with.
Software that creates hyperlinks whenever it finds text that might be a URL, combined with ubiquitous use of .zip extension for compressed files.
ZIP Files are a constant source of exploits and Malware.
Are there any exploits that have ever made use of TLD <-> file extension confusion? This seems really unlikely to help pull off an attack, even if the TLD was .exe, but maybe I'm overly optimistic.