fingerprintjs / external-protocol-flooding

Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
https://schemeflood.com
MIT License
644 stars 47 forks source link

About the "scheme flooding"? #11

Closed ghost closed 3 years ago

ghost commented 3 years ago

I am a developer from China, and when I try to translate the term "scheme flooding", there seems to be no easy-to-understand answer, so I would like to ask how do I understand the term "scheme flooding"?Looking forward to your reply, thanks!

anewuser commented 3 years ago

研究人員解釋,之所以稱為方案洪水漏洞,是因為其使用自定義URL方案(URL Scheme)作為攻擊媒介。 https://www.ithome.com.tw/news/144424

URI schemes: https://zh.wikipedia.org/wiki/統一資源標誌符方案 你也可以看看: https://zh.wikipedia.org/wiki/洪泛路由 ("flooding" in another IT context)

ghost commented 3 years ago

研究人員解釋,之所以稱為方案洪水漏洞,是因為其使用自定義URL方案(URL Scheme)作為攻擊媒介。 https://www.ithome.com.tw/news/144424

URI schemes: https://zh.wikipedia.org/wiki/統一資源標誌符方案 你也可以看看: https://zh.wikipedia.org/wiki/洪泛路由 ("flooding" in another IT context)

多谢兄弟

spalt08 commented 3 years ago

@anewuser Thanks for the help!