Ask HN: Why does the US Visa application website do a port-scan of my network?

I have recently installed this extension on FF: https://addons.mozilla.org/en-US/firefox/addon/port-authorit... and yesterday I visited this website: https://ceac.state.gov/genniv/ and I got a notification that the website tried to do a port-scan of my private network.

Is this a common thing? I have just recently installed the extension, so I am not sure if there are a lot of other websites who do it.

Since looking into it, I noticed that uBlock Origin already has the default list "Block Outsider Intrusion into LAN" but it wasn't enabled.

361 points | by mbix77 9 hours ago

24 comments

  • b3lvedere 3 hours ago
    "Since looking into it, I noticed that uBlock Origin already has the default list "Block Outsider Intrusion into LAN" but it wasn't enabled."

    Never knew that this existed. Thank you!

    • nerflad 1 hour ago
      Checking out the initial request on github for this feature I wonder why is this necessary? What access to the local network does the browser provide, or need to provide, and why isn't this something developers are more concerned about? I had a feeling this was possible as I see lots of mdns requests when I connect to certain things running sockets.

      https://github.com/uBlockOrigin/uAssets/issues/4318

    • balamatom 16 minutes ago
      Massively improved my security posture with this. Thanks all!
    • dd_xplore 3 hours ago
      Is that available in lite version too? Now that the origin js being phased out
      • LarMachinarum 27 minutes ago
        … or you can instead phase out those browsers who try to force blocker restrictions i.e. spyware on you (e.g. chrome and such), and use one of the browsers where you can use the full-featured (not "lite") uBlock Origin instead, e.g. Firefox.
      • daveidol 2 hours ago
        It’s only being phased out on Chrome, by Google.
        • ddlsmurf 1 hour ago
          Yes, to make us safer, now you enable developer mode and disable signature checking to install it locally, thanks Google
          • maleldil 1 hour ago
            Soon, you won't be able to install it locally because the API it relies on will no longer be available. Use Firefox.
      • nicce 3 hours ago
        You can't change browser? Or is there something bigger happening?
        • surajrmal 35 minutes ago
          Not everyone wants to change browsers.
          • LarMachinarum 21 minutes ago
            then again, if the makers of one big browser (and via there also the derived browsers) start force-shoving spyware upon you (by restricting blockers), it comes down to a decision of how you set your priorities. Personally, It's a clear cut red line, but you do you.
      • bilalq 1 hour ago
        Just checked, and it seems like it is. Not enabled by default for some reason.
  • edarchis 8 hours ago
    Visa application is riddled with scams. From the simple website that charges you twice the price to websites that will tell you that you were rejected and then fake your documents to get in with your name. So they're probably trying to see that you're not one of those web servers, a proxy for them or detect some known C2 channels.
    • mrtksn 6 hours ago
      That would be quite clever for an incredibly horrible website. The other day my SO, who is a Turkish citizen, was filling up her visa application and after half an hour of meticulous form filling the system just kick her out. I think the session times out or something. If you haven't created an account or you haven't write down the current application ID everything is lost. In the process she was also directed to a non-.gov website for something during the process, I thought she was getting scammed but no.

      It actually makes sense to have a paid service that makes this abomination less painful. Though they work with VFS Global for collecting the applications and relevant documents, the VFS Global itself is an abomination and doesn't help with the handling of the form filling anyway.

      Recently EU streamlined the Schengen visa application process for Turkish citizens as those "visa agencies" that are the official agencies and the only way to apply for a visa for many countries don't actually help with anything and are scamming people by selling the "good hours" for the visa appointment on the black market. An agency was dropped for this and the scams by agencies were listed among the reasons to streamline the application process.

      Both with US and EU people are losing scholarships etc. due to outrageous wait times that are sometimes are years ahead or there's an issue with the systems handling the applications.

      I guess there must be an opportunity there to fix all this together with smaller stuff like handling transliteration and character encodings, I wonder if some of those scam site are not scams and actually help with it. An AI agent can be useful here.

      • AnotherGoodName 21 minutes ago
        The VISA appointment scheduling site rate limits to a ridiculous degree these days. As in refresh your page within 10seconds and get a 429 error.

        That's probably because of the fact that the appointments are near impossible to get, they only allow booking a few months out and it's always completely booked. So everyone was refreshing (or if clever botting) to get an appointment slot.

      • rwmj 5 hours ago
        You might be making the assumption that the US wants to make the process easier.
        • throw10920 57 minutes ago
          Not to defend the US immigration system, but my experience is that this user-hostile behavior (modulo the port scanning lol) is endemic across US government websites - including those that nominally want to serve you, those that are at the state level instead of the federal level (such as the DMV sites), and those that are even internal for use by government employees only.

          It's bad enough that in some cases I believe the designers should be threatened with legal penalties.

        • clarkmoody 1 hour ago
          The purpose of a system is what it does.
        • IT4MD 2 hours ago
          That would be an abysmally poor assumption currently.
        • swat535 1 hour ago
          If there is any conclusion to be drawn here, it is that the United States doesn't want foreigners in their land (for tourism or otherwise).

          I'm not sure I see the upside of moving to a nation knowing that its citizens actively despise my existence.

        • dfxm12 1 hour ago
          I'd invoke Hanlon's razor, but in this case, it's certainly both malice and stupidity...
        • cromka 4 hours ago
          You use the same system for Business visas. Hard to imagine US wouldn’t want those as easy as possible.
          • jazzypants 1 hour ago
            You don't have a good enough imagination for how stupid our current leadership really is.
            • more_corn 20 minutes ago
              I guarantee the visa system was created before the current administration.
          • conductr 1 hour ago
            As a US citizen, I feel it’s opposite. Hard to imagine they’d want anything related to visas to be easy.
          • nkoren 4 hours ago
            Hard to imagine that the US wouldn't be as paranoid, self-sabotaging, and bureaucratically inept as possible? </sarcasm>
          • jimz 3 hours ago
            [flagged]
            • cogogo 3 hours ago
              My wife, a green card holder, applied for citizenship in April and was naturalized yesterday (from an EU country). Not that I don’t believe it could be true but where are you getting the 3-4yr timeline? If that’s accurate she/we may have dodged a massive bullet.
              • bluGill 2 hours ago
                Spouses always get better treatment as there is a voter who would be mad otherwise. They check for scam marriages but otherwise hurry the process through - if they don't a voter contacts their congressman to push the process. That voter will also likely know a lot of other voters and thus influence the next election while someone not married is unlikely to have that local network to use.
                • filoleg 1 hour ago
                  This is patently false for one reason - once someone has a U.S. green card and has met the residency requirement to apply for citizenship, the application form and process are the same for everyone, regardless of how they got their green card (through work, marriage, asylum, investment, etc.).

                  Once you are eligible to apply, the whole process is basically form N400->biometrics->interview (just doublechecking your name and other paper info, takes 5 minutes)->civics test->ceremony.

                  However, the timelines and process for getting the green card itself is different depending on the nature of your visa, and they will indeed try to check for scam marriages before you get your green card (if you were applying for it through the marriage visa).

                • cogogo 1 hour ago
                  I would love to see data that backs this up. While definitely plausible the pathway she followed to naturalization was based on time in country and not our marriage. I didn’t need to push but I’ve generally found my congressman (who is also almost our neighbor) to be pretty unresponsive on any other issue.

                  My understanding - which may not be correct - is the length of the process primarily depends on your country of origin and secondarily on how you are eligible. Very interested in any source showing that a relatively normal process has pushed out from months to years.

              • ecshafer 1 hour ago
                3-4 year timeline makes more sense for Greencard application to Naturalization, that was 4.5 years for my wife. But its not 3-4 years N400 to Naturalization, no way.

                Timelines for USCIS depends heavily on where you are, since some offices just have more people to go through than others. So I have talked to people that one step might be 4 months for them and a year for another person.

            • giantg2 3 hours ago
              I don't see how blaming the pre-existing website on the current administration makes sense.
              • speakfreely 1 hour ago
                It's not new. Rabid ideologues on the other side blamed Obama for things that pre-dated his administration, as well. Some people just can't be rational when it comes to politicians they don't like.
              • wat10000 1 hour ago
                Indeed, the real problem is a pervasive attitude that the USA is the best country in the world by far and everyone is clamoring to get in. We don't really care if foreigners come or not, and they'll come anyway, so why bother making the process friendly?
              • shazbotter 1 hour ago
                People really really dislike when you point out that the democrats are also broadly anti immigration in practice. They forget Biden deported 4.6 million people vs Trump's 2 million.
              • zzzeek 2 hours ago
                Elon Musk set out hundreds of very young and arrogant programmers to modify code throughout the federal government including to change decades old code used by Treasury, Social Security, etc. While this went on he would tweet idiotic statements like "Dead people are getting social security!" (because he didn't understand the deceased have beneficiaries) and "we're giving social security to people who are 150 years old!" (because he and we presume some subset of his young programmers didn't understand date fields being set to the epoch indicated the date of birth/death had not been recorded).

                All this is to say we probably shouldn't assume any current US government website, especially ones that have to do with immigration, hasn't been completely modified by this team.

                • monkeyelite 1 hour ago
                  Is your claim that they found zero people fraudulently collecting social security through a dead relative?
              • reaperducer 2 hours ago
                I don't see how blaming the pre-existing website on the current administration makes sense.

                Many federal web sites were very quickly altered or replaced by the new administration.

                This is common. Work begins on some web sites immediately after the election. For example, when a new president is sworn in, the White House web site flips immediately.

                More to the parent poster's point, it has been widely reported in the legitimate media repeatedly that many federal web sites have been replaced or significantly altered by the current administration. There's an entire pseudo-department for it that also makes headlines for its greater transgressions.

                Add to that severe and sudden budget and staffing cuts, and like all government functions -- you get what you pay for.

                • DaSHacka 1 hour ago
                  So you claim the visa website was also changed by this administration?
      • karel-3d 5 hours ago
        As I wrote elsewhere; they subcontract the bot protection to F5, an external company that I see for some reason a lot on old/horrible banking websites.
        • DaSHacka 1 hour ago
          F5 is huge in enterprise and academia for firewall/VPN/load-balancer services
      • paganel 5 hours ago
        The hard truth of it all is that both the US and (partially) the EU don’t want to make this easier because seeing as wanting “outside” people is now a political liability. You may want to adjust your expectations around that.
        • mrtksn 5 hours ago
          Turkish tourist are desired, Turks love spending money on restaurants and activities especially since the prices in Turkey have become more expensive than most of the EU. Greeks even introduced special non-Schengen on-arrival visa valid on the Greek islands especially for the Turks. Besides that, EU has "green passport" exception for the Turkish nationals, where they can travel visa-free on this kind of passport that is provided to individuals that meet certain criteria and millions of such passports were issued.

          The rejection rates are also not bad and EU has a "return agreement" with Turkey, which is designed to keep the middle eastern refugees in Turkey(essentially, if you come from Turkey EU can send you back to Turkey right away ).

          Crime rates for Turks show up among the lowest ones, unlike others from the region. So I don't think that EU is trying to reduce visas for Turks.

          • rat9988 4 hours ago
            You are looking at it from Turkish perspective unfortunately.
          • lazide 2 hours ago
            The US gov’t has been actively targeting CANADA, one of the countries historically closest trading partners and allies.

            Maybe in the EU it’s all good, but expect a lot of turbulence in the US.

        • eviks 4 hours ago
          That doesn't explain the same poor operational quality before it became a liability
        • teknopaul 4 hours ago
          [flagged]
    • testdelacc1 7 hours ago
      Another data point - 5he Indian visa system is similar. The official website ending in .gov.in, which is hard to find, offers a visa for $10 and minimal hassle. The scam websites, with better SEO sell the same shit for $80. They’re just proxying your application to the real website and pocketing the difference.

      It would be good if the Indian government could block the scammers but I guess it’s a lower priority for the moment.

      • somenameforme 2 hours ago
        Not sure if this is the case for India, but I've experienced similar situations for other countries, but the 'scam websites' actually provided a real service - if you needed some ultra-urgent processing (like you only realized you needed a visa to this country before boarding a flight, once you were already at the airport check-in...) they were able to provide 30 minute approval, whereas the official site's accelerated processing was 24 hours.

        So obviously the only way they could to this is with government contacts meaning the government themselves could already do it, but a lot of immigration stuff everywhere is full of people taking kickbacks.

      • sumedh 6 hours ago
        The scam websites are probably owned by someone who works in the Indian govt.
        • datadrivenangel 1 hour ago
          This was the case with Ghana. The Embassy in the US had an unofficial offical partnership with an expediter scam (charge more for faster shipping, looks very official). They fired the whole visa staff when it finally came to light. Probably because someone forgot to let their manager's manager in on the scam.
        • p3rls 3 hours ago
          Almost certainly, entire industries have been given over to indian scammers and their government allies.
          • tonyhart7 1 hour ago
            damn bro, how bad situation on there????

            I know that Indian scam stereotype is racist and bad but how much it is "that bad"

          • cyanydeez 3 hours ago
            Modhi, for one
      • bluGill 2 hours ago
        I found the real website, but the application never went through, always some issue. My boss told me which service to use and everything just worked. (I could expense that service so cost didn't bother me)
      • mdp2021 7 hours ago
        [dead]
    • ChrisRR 4 hours ago
      I'm not too familiar with network side stuff. What would a port scan be able to detect that would indicate that you're a scammer?
      • Thorrez 3 hours ago
        Just a guess, but maybe a typical bot has a webserver, ssh server, some other servers running on the same machine, whereas a typical Visa applicant doesn't.
        • immibis 1 hour ago
          Or a browser automation server (Marionette/CDP). I seem to remember watching a presentation where it was mentioned you could detect them this way, <s>but I don't remember where or what it was called.</s> this one: https://www.youtube.com/watch?v=4nZD6ee2Xo8 (WHY2025: Stealth Web Scraping Techniques for OSINT)
    • jaimehrubiks 8 hours ago
      This is a very clever answer.
    • dns_snek 7 hours ago
      Huh, how do you imagine that would work? This "scan" is happening inside client-side javascript, delivering the file through a proxy wouldn't "detect" anything about the proxy.
      • JosephRedfern 6 hours ago
        I imagine it may not be a proxy in the true sense, but a headless browser that's "proxying" the application process rather than the network traffic itself.
      • alistairSH 5 hours ago
        Proxy is being used in the traditional sense here. It’s common for a business (scam or legit) to handle visa applications on behalf of customers.
    • 1oooqooq 2 hours ago
      it's riddled with scams, and thinking any of this will detect any of the things you mention is very foolish, native and show a total lack of understanding of the scams. of you think using a proxy is essential for visa scam, i would even know where to begin to correct you.

      it's one hundred per cent clueless privacy invasion. they are probably also opening ports via other means and using that for side channel ID like Facebook does.

      just like any other documentation scam, the only weak point is on the "last mile" that's why you will always have a human interviewer.

      the visa process is abusive and unpractical because people will work around any hurdle and their kpi will never be affected no matter how crappy they manage to make to whole process. or how many doge kids implement useless privacy invasion tech just because.

    • actionfromafar 7 hours ago
      If the proxy scams are just a little clever, they'll run the proxy on an another IP.
  • karel-3d 5 hours ago
    It's coming from a F5 script, which is a company that sells anti-bot protection amid other things. (It's coming from obfuscated script at /TSPD, which is a F5 thing.)

    https://www.f5.com/

    • karel-3d 5 hours ago
      TS seems to be short for TrafficShield (a product of some company F5 acquired in early 2000s) and PD seems to be Proactive Defense (?)
  • lordofgibbons 3 hours ago
    How and why do browsers allow this? Why wouldn't the browser ask for permission in the same way that it does for Microphone access?

    It's insane to allow any random website to port scan my LAN. If this wasn't a "feature", I would have considered this a high severity vulnerability

    • JJJollyjim 3 hours ago
      Chrome doesn't allow it - local network services have to opt-in to being fetchable from public sites (https://github.com/WICG/private-network-access), although they're replacing it with a user-permission-based approach (https://github.com/WICG/local-network-access).

      (There is some language online suggesting PNA has not actually shipped, but I experienced it myself in stable Chrome several years ago, so I am unsure of the current state).

      Firefox doesn't implement either approach -- I assume this is indicative of their lack of development resources.

      • adithyassekhar 30 minutes ago
        > Firefox doesn't implement either approach -- I assume this is indicative of their lack of development resources.

        Since ublock had this as a feature for a long time, I'm sure they are aware of it. Unlike other non funded oss projects, Firefox can't and shouldn't shield themselves with this lack of development resource excuse. They have millions.

  • M95D 8 hours ago
    I'm using uMatrix and it blocks by default all connections outside the requested site and parent domains. For example, if I request https://mail.yahoo.com, connections to yimg.com are blocked. I need to manually allow each CDN for each website, so this attack/profiling won't work.

    Using uMatrix was very annoying at first, most websites are broken without their CDNs, but after a few months or so, the whitelist grew and it contains 90% of websites I visit.

    On my system https://ceac.state.gov/genniv/ tries to connect to captcha.com, google-analytics, googletagmanager, 127.0.0.1 and "burp" (a local hostname that doesn't exist in my network). Interestigly, the browser console doesn't list connection attempts to localhost or burp. If I allow 127.0.0.1 and "tcpdump -i lo", I see connections to port 8888, which isn't open.

    • noja 7 hours ago
      How does uMatrix handle the Facebook tracking pixel, or the replacement which is the Conversions API Gateway?

      This is a container that FB gives you to host that lives under your domain (it can be your main domain) that slurps up user data and sends it to Facebook from the server side. You embed some JS in your website, and they hoover up the data.

      • M95D 7 hours ago
        It doesn't handle it. Anyway, there's no way to know what a website does on the server site. Even a completely static website could be sending the server logs somewhere.

        There are options to not load JS, images, XMLHttpRequests, frames, cookies, for each site, but it doesn't list individual files.

        • noja 5 hours ago
          Then why use it? They're number one.
    • user070223 7 hours ago
      uMatrix is archived and I think uBlockOrigin is now advised to use(which incorporate uMatrix by enabling advanced settings)

      For those who want to try blocking more stuff you can enable hard mode and bind relax blocking mode keyboard shortcut

      I'd recommend also enabling filter lists(I advice yokoffing/filterlists and your region/language)

      https://github.com/gorhill/uBlock/wiki/Blocking-mode:-hard-m...

      • M95D 6 hours ago
        But uBlockOrigin UI is so much worse...

        Besides, uMatrix works fine. It's that kind of program that doesn't need any updates.

        • rapnie 1 hour ago
          I would really like an intuitive UI for people who don't want to do 'a project' to get their config tight.
      • account42 5 hours ago
        Until uBO has an even remotely usable interface for this use case people (including myself) will continue to use uMaxtrix or forks of it instead.
      • Semaphor 6 hours ago
        I reluctantly switched to only uBo because of uM bugs. But the UI/UX is just a huge step backwards to enable mobile usability.
      • OJFord 6 hours ago
        uBO advanced settings still isn't as flexible as uMatrix was though, fwiw. (I did give in and switch in the end though.)
      • aembleton 5 hours ago
        With uBO I can't block cookies by domain.
    • quietfox 7 hours ago
      It seems to try to check if you are using the Burp Suite on their web application.
    • samsonradu 8 hours ago
      How does it manage to hide the requests to 127.0.0.1 from the network tab?
      • M95D 8 hours ago
        I have no ideea. Possibly that's a limitation of Chrome+Firefox developer tools (I get the feeling it's the same code)?

        But I found what "burp" is: https://portswigger.net/burp/communitydownload

        • culturestate 7 hours ago
          It seems like they only make the localhost requests on your first visit. If you open devtools in incognito mode (or just clear the cookies) before accessing https://ceac.state.gov/genniv/ you should see those 127.0.0.1 attempts as ERR_CONNECTION_REFUSED in the network tab.

          Somewhat more worryingly, Little Snitch doesn't report them at all, though that might just be because they were already blocked at the browser.

        • inferiorhuman 5 hours ago
          • hoherd 4 hours ago
            > 400_random_url_with_numbers_403

            That looks so much like test code that was shipped to prod.

            Searches for that string on GH does return results.

      • worthless-trash 7 hours ago
        The requests are not made, because some operating systems prevent this.

        If you're on OSX, the permission to "discover on the local network" prevents it from happening ( System Settings -> Privacy & Security -> Local Network -> yourbrowser )

        Could also be 'network' permissions on firefox ( Go to Settings > Privacy & Security > Permissions ) which is on a per site level, but iirc that could be set site-wide at some point.

        The other browsers likely have similar configs, but this is what I have found.

        • snowwrestler 1 hour ago
          Looks like this is new to MacOS 15 Sequoia, as I don’t see a Local Network option in Sonoma.
    • thaumasiotes 7 hours ago
      > On my system https://ceac.state.gov/genniv/ tries to connect to captcha.com, google-analytics, googletagmanager, 127.0.0.1 and "burp" (a local hostname that doesn't exist in my network).

      That will be this burp: https://portswigger.net/burp/documentation/desktop/tools/pro...

      Sounds like they don't want you to analyze their site.

    • sylware 5 hours ago
      Whitelisting seems to be the way to go. With IPv6 and OS generated IPs (up to what the ISP domestic router allows) could be very efficient.
  • dns_snek 7 hours ago
    The "port scan" just seems to be a local connection to 127.0.0.1:8888. I don't know what purpose it serves on this page, but our government websites often use this technique to communicate with native software for digitally signing documents.

    Are you seeing connection attempts to other IPs?

    • junon 6 hours ago
      Might also be card readers, debug servers, etc.

      Could also be incompetence :D until I fixed it, deploying from my local machine rather than CD resulted in one of the baked in URLs being localhost rather than the public host on the project I'm working on now. Their local development server might just be at port 8888. Wouldn't surprise me.

      • dns_snek 4 hours ago
        I looked at the website again and noticed that the request paths looked odd, one of them being `/400_random_url_with_numbers_403`. I googled that and it looks like it's part of a client-side bot detection script that's testing something, the explanation isn't very informative.

        https://my.f5.com/manage/s/article/K000138794

        > These requests are caused by the bot profile to test the different browser capabilities.

        > 'http://127.0.0.1:xxxx' request is a call to the localhost/client machine, which is normal when trying to protect assets like end-server using ant-bot defense. It does not have any impact regarding application page load.

    • tifkap 5 hours ago
      This is most likely an attempt to connect to a webserver on your own device to collect data and/or do tracking.

      Remember back in June when Facebook/meta got caught tracking users trough a webserver on Android phone thought Messenger and Instagram? Same thing.

      See: https://news.ycombinator.com/item?id=44169115 and https://news.ycombinator.com/item?id=44175940

  • galaxy_gas 8 hours ago
    Many sites do it .Included in many standard device fingerprinting / anti anonymity SAAS. Ebay facebook etc all do this ! But it looks this is first party to prevent the adblocking of them

    1MB of obfuscated fingerprinting + portscan + Webgl . But oddity this one is trying to find burp suite specific route's.

    • meitham 8 hours ago
      Madness! How do I harden my network against that?
      • bawolff 7 hours ago
        Chrome is already in the process of killing it https://developer.chrome.com/blog/local-network-access
        • ahdanggit 5 hours ago
          The company I work for has a legitimate service that runs on the loopback (it provides our web apps APIs for some device integration) hopefully its just as simple as the user accepting the prompt else we'll be drowning in support. We had to go the path of the local service because they killed NPAPI. I've been thinking about using web serial as an alternative but Firefox doesn't support it.

          That being said, I think this is an overall win, hopefully Firefox implements it in a consistent manner as well.

      • dns_snek 6 hours ago
        Enable "Block Outsider Intrusion into LAN" filter list in uBlock Origin.
      • ale42 8 hours ago
        You should actually harden your browser or PC... to block any unwanted requests. Apparently some browser extensions can do that.
      • bmacho 5 hours ago
        It would be the job of the operating system to give or take away the ability of your browser to access your local network. But you can run your browser in a container/vm and disable localhost. (And use a separate browser for localhost only if you need it.)
    • ahdanggit 5 hours ago
      my bank did this on the site they sent me to in order to activate my new card.
  • gethly 7 hours ago
    Just a little side note - in this context, it makes sense if the website tries to connect to a local port because you might be running a card reader(ie. terminal). This is how it works with some(all?) EU countries that have a chip in their ID cards, or even vehicle registration cards, which you can use to access sensitive information or perform certain administrative tasks on government websites.

    Although, from personal experience, it used to require java and it worked only on internet explorer and since it has been retired and replaced with chromium, i am not sure what is the way to make it work nowadays, as i have not been able to figure out to use it when i needed the last time.

    • layer8 1 hour ago
      It requires installing a local service that bridges between the browser and the smartcard driver (what Java applets did in earlier years). The web app then communicates with the service via requests on localhost. The card-specific driver and bridge service are often bundled together for installation.
    • cjrp 2 hours ago
      I've had it before where it asked me to use an iPhone/Android app which can read the passport's NFC chip. I guess that's the modern replacement for IE/Java.
  • e40 3 hours ago
    That extension has "Access your data for all websites" ... I really don't get how anyone can give that permission to anyone that isn't well known (a company with a lot on the line) or a person famous for their work (the uBO dev) who has stated he will never sell to anyone or do bad things.

    "Hacks and Hops" doesn't even have a valid home page. The extension links to https://g666gle.me/ which does not exist. The domain name itself does not want to make me give access to all my data for all websites to them.

    As nice as this extension seems, I would ever in a million years install it.

    • jeffbee 1 hour ago
      Unfortunately this level of incoherence is almost universal on HN and similar forums. You'd have to be completely out of your mind to install this extension, but people for some reason believe they can install privacy. They got whipped into fearing nebulous online actors so much that they'll download FSB rootkits dressed as VPNs. The minimal set of actions a rational person would take after realizing they've been tricked into installing this extension is setting their entire PC on fire and then running it over with their car, while moving all of their bank accounts to new accounts, in person, and changing all of their passwords using a brand new device.
  • asimovDev 8 hours ago
    Embarrassed to say that I wasn't aware of this practice. Are there malicious uses for this beyond fingerprinting?
    • privacyking 5 hours ago
      Yes. Facebook was using this trick on Android. Meta's android apps would host a server on localhost, and their sites would communicate with this local server to pass tracking information that would otherwise be blocked by all browser protection methods on Android. I guess it is still fingerprinting, but at the most extreme end.

      https://news.ycombinator.com/item?id=44169115

    • palmfacehn 6 hours ago
      Routers with vulnerable URLs. You can search for: "router" "authentication bypass".
      • causal 2 hours ago
        Isn't CORS supposed to prevent this?
        • layer8 1 hour ago
          CORS doesn’t prevent requests (i.e. GET requests from IMG tags, or XHR preflight requests), it only prevents web apps from processing the response if the responding server doesn’t agree. And a simple GET or even OPTIONS request can be enough to exploit vulnerabilities in routers and other local devices.
    • asimovDev 8 hours ago
      https://files.catbox.moe/g1bejn.png

      When I visit the site from Safari on macOS I see this in the console. Are there any particular services that use port 8888 for the website to do this?

    • inferiorhuman 5 hours ago
      Mostly it's great for tracking although I'm sure it could also be used to exfiltrate data (e.g. if the user is running something sensitive on localhost).

      https://www.digitalsamba.com/blog/metas-localhost-spyware-ho...

  • vaylian 8 hours ago
    > Blocks malicious websites from port-scanning your computer/network

    How does that work? A browser extension can't influence how your router and other machines in your network react to incoming requests.

    • ale42 8 hours ago
      As far as I understand it, it is supposed to be a scan done by the browser on the user's computer, not an external scan, which a browser extension wouldn't be able to detect.
      • bawolff 7 hours ago
        Hopefully should soon be a thing of the past with https://developer.chrome.com/blog/local-network-access
      • vaylian 7 hours ago
        I see. So the website would try to access private IP adresses (RFC 1918) by having elements like <iframe src="http://10.0.0.1"> in the web site and then the web site would check if the iframe was loaded successfully?
        • Delk 6 hours ago
          It could also just try making the request with javascript. Or try a websocket connection.
    • Mashimo 8 hours ago
      Judging just from the screenshots, it seems it blocks websites from accessing 127.0.0.1 get requests. Not a port scan to the outside, more of what do you have running on the local machine inside your network.
    • est 8 hours ago
      but it can hook javascript methods before that scan can happen.
  • tmdetect 6 hours ago
    Very interesting. Having looked at NoScript it seems like you can disable LAN as a default value under the allow tab.
    • tmdetect 5 hours ago
      Looking further

      * uBlock Origin and Lite have it as an option under Filter List > Privacy > Block Outsider Intrusion into LAN

      * Brave prevents it, tested with Aggressively block Trackers and Ads.

      • codedokode 2 hours ago
        Why do you need a heavyweight extension to block sites from scanning your local network? Ridiculous.

        Also I wonder if this protection is available only with old extension manifest version or new network request hooks API also supports it.

  • jhoechtl 2 hours ago
    Checking if you are sharing torrents, run a tor node, mine coins?
  • Maxious 8 hours ago
    Perhaps to avoid people using misconfigured open proxies https://en.wikipedia.org/wiki/Open_proxy

    Like a less sophisticated Tor/VPN that is easily detected by port scans

  • kolla 8 hours ago
    My biggest grief with that site is that it's like something from the 90s.
    • thrown-0825 7 hours ago
      Yeah it should have a fixed header and footer along with a pop-up consent drawer so you can only see 10% of the actual site content.

      So much better.

      Modern web design is a joke.

      • davsti4 1 hour ago
        t-shirt worthy quote - "modern web design is a joke" ;)
    • SnuffBox 4 hours ago
      >like something from the 90s

      It looks useful and looks good, there's minimal unneeded whitespace and I'm glad it looks as it does. We'd be better off if the entire web switched to a style like this.

    • danw1979 8 hours ago
      The 1990s web was actually good
    • bhaney 8 hours ago
      As something from the 90s myself, I find this rude.
      • SnuffBox 4 hours ago
        It's also inaccurate, as this style of page (relating to layout and specific graphic style) didn't appear until 2006ish.
    • yard2010 7 hours ago
      I think you are confusing something from the 90 with something from the gov
    • jansper39 5 hours ago
      These guys need to look at Gov.uk, this site is a total horror show.
      • SnuffBox 4 hours ago
        I wish gov.uk was even a smidgen as "outdated" looking as that page.
  • trod1234 8 hours ago
    Capturing forensic artifacts of the local network allows a building a bridge strategy for identifying fraudulent networks without requiring knowledge of the path taken from destination to recipient. Other local devices do this and send the network map during a phone home, allowing comparison to a source of truth that is tied almost directly to the person, or group of people.

    There is also a lot of fingerprintable material within such a port scan from clock skew, TCP ISN, and a few other areas.

    You can sieve this quite easily with this available, thanks to Roku's, Phone's, and other things doing this while just sitting locally in a shared collision domain (a digital soldier quartered in every home).

    The metadata node graph of devices locally acts as a unique fingerprint once in RFC1918 space, technically not unique but close enough.

  • jmclnx 3 hours ago
    If would be interesting to see what happens on OpenBSD. With pledge(2) and unveil(2) in Firefox, I wonder what it would see. I expect it would see nothing.

    I will give it a try and see what happens and if I see anything I will add it here.

    • jmclnx 12 minutes ago
      I saw nothing of note on OpenBSD. I added the plugin and it prompted me an attempt was made to scan the network, it said it blocked the scan

      SO, I guess that is going to be used on all my firefox runs.

  • trollbridge 2 hours ago
    For another example, studentaid.gov doesn’t work in private browsing.
    • davsti4 1 hour ago
      I just tried opening it in a private window and the page loaded and rendered. What part doesn't work?
    • jeffbee 1 hour ago
      Isn't it sort of contradictory to try to use private browsing with a service that requires your identity?
  • AtNightWeCode 49 minutes ago
    Most likely some "antivirus" bs. Probably harmless. Fun fact. Most browsers allow by default GET access to web resources on localhost and LAN. Been used for exploits since last century.
  • vkardco 3 hours ago
    this is awesome
  • jas- 3 hours ago
    [dead]
  • LoadingXD 7 hours ago
    [flagged]
  • reneberlin 4 hours ago
    [flagged]
  • slyall 7 hours ago
    Be careful your security tool isn't producing false positives.

    I remember years back when people would run these firewalls and we'd get complaints from home users about normal traffic.

    Thinks like complaints our mail servers was scanning them on port 25 when they sent email.