Files
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

412 lines
26 KiB
Plaintext

Episode: 3906
Title: HPR3906: The Oh No! News.
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr3906/hpr3906.mp3
Transcribed: 2025-10-25 07:48:46
---
This is Hacker Public Radio Episode 3906 from Monday the 24th of July 2023.
Today's show is entitled The Oh No News.
It is part of the series' privacy and security.
It is hosted by some guy on the internet, and is about 29 minutes long.
It carries a clean flag.
The summary is, Scotty discusses the threat of convenience.
Hello and welcome to another episode of Hacker Public Radio.
I'm your host, some guy on the internet, and this is The Oh No News.
Oh no!
And if those said, the language of security.
Today I want to discuss browser security with you, but to be more specific, the convenience
that's built into our browsers, as well as other web-based technology, this convenience.
At the levels for which we currently have it, it's more of a threat than we realize.
For example, you log in to one of your favorite websites like Reddit or wherever, you authenticate,
so that you may gain access to the content.
These services like Reddit and others will create something known as a session ID or
a session token, and store that token on your system for convenience.
The convenience is the workaround in authentication.
You will no longer have to authenticate on that site or service because of that session
ID token.
So in short, authenticate once, access many times afterward.
This is very convenient because whenever you close your browser, you're done with this
session, and then, you know, the next day or whatever you load up again, you will access
that content again.
And when you go to the site for that service, it automatically loads, and you can begin
accessing the service immediately, very convenient.
However, the security is lessened by this convenience.
The session ID or session tokens are stored on your hard disk, and they leave you vulnerable
if these IDs tokens were to fall into the wrong hands.
An attacker could then gain access to your data on these services without authenticating
because the site recognizes that this token is a sign of preauthentication.
I want you to think about it like if you have to badge into a building once you've went
through the employment process and confirmed who you are, they issue you a badge.
Now with that badge, that, that's your ID token, right?
You can now walk around with that badge, wave it against the scanner on the door.
It will unlock, and then you can walk forward.
No one has to then physically identify you over and over again.
So if somebody steals that badge from you, they, they, for all intents and purposes, are
you.
They can now gain access to that facility and wherever else in the facility you once
had access to.
Now, they're supposed to be best practices put in place whenever issuing these session
ID tokens, and they're, they're known as session IDs or session tokens, but I'm combining
it to say session ID tokens with the service providers are supposed to do as things like
adding like IP locks.
So if you attempt to authenticate with this token from a separate IP, that could be assigned
to something's wrong.
So if, if you want to access this service, you would have to reauthenticate.
They should also be timeouts.
If you have not access the service in X amount of time, you would need to reauthenticate.
They should also be limits to the service, such as if you wish to change the password
or the email address or whatever tied to the account, you would need to reauthenticate.
Things like that need to be in place for these online services, but we often find in many
cases they are not.
There's examples of major YouTubers.
Many of you have heard of a Linus media group.
They have the Linus tech tips, as well as other major YouTubers have had their livelihood
hijacked, you know, their YouTube channels, simply hijacked, because attackers, they sent
over email pretending to be sponsors willing to, you know, form some form of agreement.
The agreement looks like a PDF file.
Really it's an executable, but it's designed to look like a PDF file.
It'll have the Adobe icon on it and Windows has several different forms of executable,
one being the .com and .scr, which stands for Screen Saver.
It's actually an executable, as well as an understanding to how Windows file manage your
handles these things whenever, depending on your view.
If you're using the detailed view, you may catch it, but many people use the large icon
view, which will sort of hide it.
For you, you can name a file contract .pdf.src, and it'll hide the .src and only show
they contract .pdf.
So depending on the view that you're using, you know, you can have it abbreviate the
file name, and most users will just see the Adobe icon, click on it, and it will run that
dangerous executable, which in many cases, it'll steal your session ID tokens.
Now there's many different applications, not just a browser that uses these session ID tokens.
Things like a Discord, if you use Discord, other chat applications, use these session ID tokens
like Thunderbird.
However, I will say this, Thunderbird does have what's called the primary password, which
will, you know, encrypt your login session.
So if someone does steal the session tokens, they will still be required to have their
primary password in order to do anything with it.
So there is some protection there from Thunderbird.
Firefox is a different matter, though.
They do have the session ID tokens on Firefox, however, you can just navigate around it
and still gain access to the content.
You may not gain access to the actual data behind the session ID tokens, like passwords
and things that are stored in Firefox, but you can still gain access to the content that
Firefox has access to via the session ID tokens, even with the primary password.
So that one very, very sketchy, I don't know why, but it just does not work in a way
that I imagine it should.
Maybe I have a flaw to understanding of how it's supposed to work.
So one of the things that these guys do wants to steal your session tokens, well, they
try to, well, resetting the password through most sites will prompt for reauthentication.
So they may not attempt that.
However, depending on the service, they may not prompt you for reauthentication if you
wanted to change like the backup or recovery email address or backup or recovery phone
numbers, things of that nature, they may not prompt for that.
So those bits of information will be changed, meaning when you try to gain access to your
account again, the person who's currently in there will kick you out because a lot of
these services allow you to view current sessions and they'll just manually keep kicking
you or you can probably set the script or something as well to only allow their session
that's on and then kick automatically kick any other session that tries to come online,
making it difficult for the actual owner to regain control of their account.
Because as they log on, it'll show a new session has gained access, you know, usually
with the session ID tokens or if you revoke the tokens beyond that device, they'll have
to log in manually, which means it's much slower for them to try to get on board the service
and gain control of their account again.
They'll continuously be kicked out by the attacker.
Now what you'd imagine that same thing happening to you, but with something more important,
because I mean, for most of us a YouTube channel, you could just make a new one, it's
not even a bigger deal, right?
If YouTube is not your livelihood, it's no big deal that somebody took a YouTube channel
for me, you don't care.
However, Discord may be a little bit different, even though Discord was never designed to
be handling business secrets and such, it happens.
It's very convenient, therefore people just use it and they just, you know, they put far
too much trust into this thing.
So if those ID tokens are stolen, suddenly all of that data is now in hands of the attacker.
And you have to also think about this.
Your entire friends list or your company list, whoever else you interact with using that
data, they can now pretend to be you and request more data.
They can also continue the attack onto all the other co-workers by sending them files
that, you know, obviously they will open and now they have more cookies, more session
ID tokens to continue the attack.
So now that you understand more about how this attack works and why it's so dangerous
and very annoying because these companies, these companies are not interested in who
you are as a person.
They're interested in what data they can gain from you and then sell that data to advertisers.
That's their money maker, right?
That you're, you're the product, not the consumer.
So they could care less that you, you know, lost your account and all this and that.
I mean, usually that doesn't matter.
So just make a new one, continue being the product.
Now, for me personally, I have tested out different ways of using the Firefox web browser
on both Linux and Windows.
That's when I found out things like with Firefox, even though you implement the primary password,
this does not necessarily stop anyone from gaining access to the data.
Because you still have those session tokens stored and they will be used once you open
a browser, you can simply click Cancel when it prompts you for a primary password or
just ignore it and continue browsing gaining access to all of the sites that have been pre-authenticated
using those session tokens.
Thunderbirds a little bit different, they will fight you to gain access to the emails if
you try to, you know, continue going forward without putting in the primary password.
So it will be a little more aggressive and hindering you.
I'm not a pen tester or anything, so I can't tell you about any techniques that are used
to try and break through that any further.
I don't know of any either, so, you know, this is just regular user trying to find out
whether or not he's safe or not.
All right, back to my experiments and with Firefox.
I use the Firefox profile manager and created multiple different profiles, trying to separate
things, hoping that the attacker would not attempt to take from all of the profiles, but
usually they're all stored in one main directory.
It would not be difficult for the script to kind of be written to search through that
one parent directory for all of the profiles in the sub-directories.
So I figured that's a no-go, it's not going to really serve you to have a separate profile
for this type of attack, mainly if you were to be fished through email or whatever else,
some malicious attack that is designed to search your directory for the tokens.
Sorry about that, let me put my phone on mute here.
Okay, so the profile manager was not the way to go, but it was a nice little learning tool.
People tried multi-account containers, which is a very fun and valuable extension for Firefox.
I've made the best effort to get away from extensions all together, and I've talked
about it numerous times, I'll give a brief here.
We really don't know who's writing the extensions and it's not difficult for an attacker to clone
a project, a deprecated extension at everybody likes, put it out there, maybe do it honestly
for like a month or two, get a bunch of good reviews, then go black hat on you.
You're dealing with code from multiple different repositories or developers, different update
cycles, some may not be audited.
There may be these different coding practices that are unsafe that are used in the extension.
So you would have to basically take on a ton of risk when using all of these different
extensions for that sweet, sweet convenience.
And that convenience, ladies and gents, is like a drug.
I switched my Firefox browser into private mode, meaning I deleted the browser from my
system.
It was installed as a dev, I'm using Papa West, and then I installed the snap.
Who is this guy using a snap?
I went through the settings, you can go into privacy and security and change your browser
to it's always in privacy moment.
It will not remember any history, it will not cache any data and any, well, basically any
data that gets cached is deleted whenever you end your browsing session.
So every time you close the browser, browser, it does a wipe.
So I ran like that for a couple of months, just to see what the, what the hardship would
be like, every single site that I use that requires authentication, I would have to manually
authenticate every single time.
And it wouldn't that bad, honestly, the problem would be for things like my workflow with
the drug of convenience, I can open and close tabs and just, you know, on the fly.
No problem with all of these different services logged in, you know, pre pre logged in.
However, under the more secure setting that I was using, I would need to think about which
sites I wanted to go to first, because once I close those tabs, I would have to reauthenticate,
not to mention cleaning out all of the craft on the site itself, meaning when you,
when you log on the certain services and sites, they'll show you all of your login sessions.
And they'll show you which sessions are currently logged in, which ones that have been used
in the past blah, blah, blah.
Well, you got to clean that out after a while.
Otherwise, you'll have like a million, you know, login sessions in there.
And if you do run it to a problem, it'll be difficult to figure out which one is the bad one.
So there are those things to consider whenever attempting this.
So I had to build my workflow around, you know, whenever a certain time of the month would
come around where I needed to get all of my obligations together.
I needed to pick a time out of the day to get that done first.
So that way, once that's out of the way, I can close my session to wipe all of the cookies
and everything that stored, then reload and go back into the entertainment side of things,
you know, watching YouTube going to mastodon and an element and everything else,
you know, the more social side of things where the problem would come in,
because I had, I had no problem doing it this way,
but where the problem will come in is if you have a significant other that likes to just show up
and go, Hey, could you go look at the account for blah, blah, blah?
And it's like, why don't you go get your computer and look at the account for blah, blah, blah?
I've already done my portion here.
I just want to relax now.
And your significant other will be just sitting there right beside their laptop on their phone.
And like, now I don't feel like opening it.
Could you do it?
You're at your computer.
Yours is bigger with all the monitors.
Could you do it?
And that's, that's where some of the problems will come in dealing with outside factors.
So then I have to shut down the browser again to wipe the session, load it back up,
go into the account, look at the thing, make click, make the significant other happy,
then close the session again and then load back up and we all think it,
you get what I'm saying?
It would be a, a problem, but only when dealing with the outside factors.
So long as you can set up your workflow to where, okay,
when I have to do this important thing, this, this holly secured thing, I can do that first
or, or I can save that for a certain time of the day to authenticate for that.
You're good to go because I don't like to have things like say, for instance,
my bank authenticated at the same time I have something like mastodon or, or element
and knowledge, you know, you get what I mean, or Reddit or anything like that.
I want only one of those things up at a time.
Now, I don't mind having Reddit and mastodon and element.
I just don't want any of those with the more secure items.
Now, using this setup, if I were to fall for an attack where the user would attempt
to steal my session ID, well, if there were any on the system, they'd be very limited
just because during the time that the attack happened, if a browser session was open,
they'd only have access to a certain type of information at that time, meaning,
this is a good chance I'm not going to have any of my banking or really personal
private accounts, that kind of information authenticated at that time.
I'm going to manually clear that and close the browser before loading up for a social
session. So if they do get any information, it'll be, you know, whatever social
session was authenticated at that time.
By the time I realized there's a problem, I can then begin trying to trace back,
figuring out where the threat came in that and trying to recover my session from the
attacker or recover my account from the attacker.
Now, another thing I noticed as well, when you're logging on to YouTube, and again,
this is on the Firefox web browser and the difference between Windows and Linux.
On Linux, when I log on to YouTube, I use my Ubiqui as well.
So I have to do the username, password, and user key.
I'm a Ubiqui on Linux.
After I thought after I authenticate with the Ubiqui, there'll be this screen that shows
a little checkbox that says, would you like to maintain the session, you know,
basically store a session token?
You know, remember this browser, whatever the terms they use.
And I leave that unchecked or I will manually uncheck it.
I think it is pre-checked.
So you have to uncheck it, then click OK to go forward with the account.
That's how Firefox behaves when authenticating on Google's YouTube in Linux.
On Windows, it's different.
The moment I put in that Ubiqui and authenticate, it'll show that screen for the session ID token
for like half a second and immediately jump right into YouTube.
So you don't get time because I take my Ubiqui out of the PC.
I don't leave it in there.
I take it out as I'm withdrawing the Ubiqui.
I noticed the screen shows up for like half a second and then boom automatically takes you in.
So my, I don't know why it does this.
But I can assume that it's for convenience.
They just automatically go on, OK, it'll be more convenient for you to have this token.
So here you go. Take the token.
We are the Google and you will have the convenience.
Take it now.
I've been trying to do more research and learning about the rather not the standards for this kind of thing.
But it's hard.
I don't know what terminology is used other than session tokens and ID tokens.
And there's also like a JSON web token.
I don't know if companies are even required to have standards for how long these session IDs are supposed to last
or what restrictions to the service the token is allowed to cover.
So you know, just using YouTube as an example.
Maybe you can watch videos with it, but the moment you try to gain access to the YouTube studio or anything
and the private information or or anything that would allow you to edit the YouTube channel.
In any way, you would need to reauthenticate.
You know, that there should be limitations to access with these tokens.
And they should be like hard numbers encoded in the token, making clear this thing is only going to last or
or the user should be given the option, right?
I should be able to go into security settings.
And if I chose to have the token, I should be able to set that this token, any of my tokens only last for one week, two weeks, you know, whatever.
So at the end of this one week or two week, mandatory, reauth indication and all sessions must be removed.
So even if someone does get that token and gain access to my account, they only have a week before I'm going to gain access.
Because only I can reauthenticate, you know, I've got the two factor and the credentials to get back in, where's the attacker only has the token.
I don't know who to propose this type of change to other than the company themselves.
And I've done this with certain companies, but I mean, mostly my bank, I've made tons of proposals to my bank.
And, you know, they they listen to me, but I've seen no changes.
Do you have a degree?
No, within get out, they invite me to, um, I guess community sessions or whatever it is that they do.
But only thing they do at the community session is just talk to you about more crap that they want to, you know, you'd think that they want to hear from you at the session, but you get there.
And all of a sudden they're talking about mortgage rates and all kind of crap is like, I didn't come here for that.
I came here to talk to you about why you're crap.
So outdated and busted, you know, why on earth are you still in 2023, putting a limitation on the password.
You know what I mean?
I can't have a strong password on the banking site, but I can on the social media site.
Why on earth?
Can I use a ubiquit on Facebook or Gmail?
But I can't on my banking, you know what I mean?
You give what I'm saying?
Why is everything more secure than the bank, but that there I go off often on another tangent.
So let me go ahead and end this now before before I end up somewhere else again.
Be careful using your browser and any web based technology, you know,
this coordinates are the apps that will allow you to authenticate and store session token.
See what options they have for those tokens and way rather not the risk is worth it or not.
I have gone back to using Firefox in private browsing mode.
Once I attempted that, you know, months ago and then went back to using it the way that most people would use it,
where it was store session ID tokens.
And then I used a multi account container extension to help try and separate everything.
That convenience that is provided through those tokens feels like a drug.
That's how good it is.
I'm telling you, when you step away from it for a couple of months, like cold turkey, don't use it.
You get used to using that setup to where you set up your workflow to wear.
Okay, I know I'm going to have to immediately load up my keypad sexy,
get the important stuff out of the way first, check my email and everything.
Make sure I got it all out of the way.
Then close that session, erase all the data and then begin my more social activities.
Once you get that workflow down, it's not as painful as you think it is.
It's actually really nice knowing you're secured.
But then when you try that convenience again, oh my God, you're hooked.
You're once again back in the corner, rocking back and forth in the fetal position.
More, more, give it to me.
I must have it more.
You have to have the convenience, you know, I'm telling you, it's like a drug.
You have to have it in the companies.
They don't have any obligation to your to your security.
So if anybody's going to care about your security, it better be you.
I encourage all of you.
You know, I don't recommend you living with the same settings that I live with.
I do it because I want to feel safe.
That and I'm interested in knowing if I'm really safe with some of these things, right?
Like how practical is it to try some of these things out?
So I go out and I test them out, but I encourage you to try this one.
erase all your cookies.
You don't have to use the snap version of Firefox like that.
But I mean, just of course, not you for using a snap.
Just delete your browser and everything on it, reinstall it, set it up to where it's in private browsing mode.
It's easy to do.
I can now talk to you about it real quick when you pull out my browser.
All right.
So you click on the hamburger menu.
You go over to settings on the left hand side is going to be privacy and security.
I have strict set under the enhanced tracking protection.
I have always set up for do not track, you know, sending sending the websites to do not track signal.
I have that selected as always cookies and site data.
I have the box down there checked for delete cookies and site data when Firefox is closed.
But because I'm in private browsing mode, it's going to do that automatically.
I still manually click the button.
It says clear data.
It'll be on the right hand side where it says your stored cookies site data and cashed.
I still manually click that after I've done more private activities banking and the such.
Because I want to make sure it's gone.
I unchecked the stuff that says logins and password where it asks to save your logins and passwords.
And if you scroll down where it shows a history.
If you click on that, you can put never remember history.
And then it's the check box that says always use private browsing mode.
I have that checked.
So it will then switch Firefox.
You have to reload Firefox after clicking that.
And then it'll show that Firefox will be using a custom settings for history.
And again, once I've done my private banking and blah, blah, blah.
I also click the clear history just to make sure it's gone.
So I manually click the clear data and clear history to make sure it's all out the way.
Now the permissions down there again, they have like location, camera, microphone, notification, auto
play and virtual reality on those settings.
And when you click on them, I, there's a check box down there that says block new requests.
I click that I want no new request for anything to come in.
If you're in school and depending on what your school uses, some schools will use like Zool
and things like that.
So if you're using it in the browser because on Linux, a lot of these applications don't exist.
You're going to have to use the browser.
You may have to change that if the if it even works in Firefox.
Because with some of them, you'll have to use Chrome as well.
I'm trying to remember.
I think teams is one of the ones you have to use Chrome with.
I can't remember right off the top of my head.
It's not about that.
And with this show is not about that.
So I just wanted you to know how to test this out for yourself.
See what life is like when you, when you're sober, free of all of this
convenience that they provide you, give it a while.
You know, you really need to sober up for, I'd say give it about two weeks,
setting up your workflow, getting comfortable, manually authenticating every time
and just adjusting yourself to that workflow.
And then go back to that convenience lifestyle.
I'm telling you, it's going to hit like you, like you're taking a drug.
All right.
So if you go ahead and this is the end of the show, folks, I got some links down in the show notes.
That way you can learn some more about these type of attacks and gain some
information on these session IDs, you know, to session tokens, educate yourselves.
But that's it for me.
I'm out of here.
Get you guys in the next episode.
Thank you for listening to Hacker Public Radio.
I'm some guy on the internet.
And this concludes the Oh no news.
Oh no.
You have been listening to Hacker Public Radio at Hacker Public Radio does work.
Today's show was contributed by a HBR listener like yourself.
If you ever thought of recording broadcast,
click on our contribute link to find out how easy it really is.
Hosting for HBR has been kindly provided by an honest host.com,
the internet archive and our sync.net.
On this advice status, today's show is released under Creative Commons
Attribution 4.0 International License.