The weakness is very simple but sadly not often warned about in tutorials or guides on how to write a proxy. If the input is HTTP and output is also HTTP and the attacker has significant saying on both ends, a malicious user can shape the output of one proxy to be the input of another proxy, we call this a proxy chain
https://yumechi.jp/en/blog/2024/misskey-hardening/
https://git.usbharu.dev/usbharu/misskey/raw/commit/e967d9ded35cbdf937bbc232e05a5fa0966458a7/src/misc/fetch.ts

#ProxyChain Misuse..  

#repost •acws #acws
Misskey Hardening

My own experience and experiments in improving my Misskey instance's security.

Yumechi

🔓 #Poll: Which one do you prefer for #anonymous networking? ⚙️ #Torsocks vs. #Proxychain

Cast your vote below! 📝
#cybersecurity #privacy #infosec #tech #boostwelcome 👍

⚙️ Torsocks 🧦
85.7%
🕶️ Proxychain ⛓️
14.3%
Poll ended at .

Here is a little bit to read regarding our services etc.

https://techsaviours.org/news/en/tech-saviours-news-28-04-2024

There will be also something coming along soon that gives you the ability to inspect your devices/networks.

It's based on:
#mitmproxy #frida #tcpdump #proxychain #wireshark

#network #security #proxy #Tracking

TECH SAVIOURS News - 28.04.2024 | Digital Privacy News for the Community | TECH SAVIOURS .ORG

Your community channel for digital privacy news! Stay up to date with TECH SAVIOURS News!