Someone bought google's 42.zip domain

[Deleted by author.]
40
Jump in the discussion.

No email address required.

https://i.rdrama.net/images/16852909379822853.webp :#marseyconfused:

Jump in the discussion.

No email address required.

Jump in the discussion.

No email address required.

Done

Jump in the discussion.

No email address required.

Now mark it as safe and extract...

Jump in the discussion.

No email address required.

Ok doing it now https://i.rdrama.net/images/16852929114239957.webp

Jump in the discussion.

No email address required.

Show progress :marseylgbtflag5: BIPOC

EDIT: RIP

Jump in the discussion.

No email address required.

Now press ALT + F4 :marseytroll:

Jump in the discussion.

No email address required.

No that would :marseywould: pause the extraction. You're not fooling me troll :marseyflamewar:

Jump in the discussion.

No email address required.

:marseydance:

Time to buy marsey.zip

Jump in the discussion.

No email address required.

I don't get how this is a problem? Someone that would get got by that URL would also just download the zip bomb anyway, so what's the big deal?

Jump in the discussion.

No email address required.

If anything this was a bugfix that made sure you got your zip bomb even if your email broke.

Jump in the discussion.

No email address required.

Someone could, for example, buy the attachment.zip domain?

Even better :marseysaulgoodman: if google's own security :marseyblart: considers "attachment.zip" as a malicious :marseyevil: link and blacklists all those emails.

Jump in the discussion.

No email address required.

Yeah, I mean the 42.zip one

And even attachment.zip one I find kinda iffy because people will just click any old shit anyway, I don't think it creates a new security flaw, it just exploits an existing one further

I tried to do a funny but Aevann is mean

Jump in the discussion.

No email address required.

https://i.rdrama.net/images/16852988467056239.webp

I see zoomers being tricked by attachment.zip or similar schemes

Jump in the discussion.

No email address required.

I wasn't sold on this either until a week after the initial drama when I had someone explain to me that http://github.com/releases/abunchofshit:/[email protected]

Will take you to somelengthydomain.zip (not github, the url is formatted as username:[email protected]) which is a legit attack I could imagine a reasonably tech savvy person falling for, especially if you check the tooltip and it reads http://github.com/relea...thydomain.zip

I think there are some caveats to that and it doesn't work exactly that way but it seems legit and could be targeted.

All the panic over random zip file names becoming hyperlinks that someone would just happen across, buy the domain and then just hope someone would click on it was very dumb though and was helpful in filtering retarded follows of mine on Twitter.

Jump in the discussion.

No email address required.

People like to be dramatic and h8 new domains

Jump in the discussion.

No email address required.

This means many website frameworks will identify 'name.zip' as a clickable URL link.

This is so r-slurred. Isn't ICANN suppose to be in charge :marseyrentfree: of who gets new TLDs? They're worthless.

Jump in the discussion.

No email address required.

>someone did buy the https://www.42.zip/ domain and rigged :marseyitsrigged: it to download 42.zip

seems like you get what you ask for

anyway if a zip bomb causes problems for you in 2023 you might be r-slurred :marseypaintretard:

Jump in the discussion.

No email address required.

ok who buys BIPOC.zip?

Jump in the discussion.

No email address required.

Wingcuckery and its consequences have been a disaster for the human race

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.