Omdat er onveilige connecties lopen - SSL Tracker scan geeft dat reeds aan:
Website is insecure by default
100% of the trackers on this site could be protecting you from NSA snooping. Tell signal.org to fix it.
All trackers
At least 1 third parties know you are on this webpage.
-signal.org -signal.org
Legend
Tracker could be tracking safely if this site was secure.
Tracker does not support secure transmission.
Af te voeren jQuery bibliotheek: jquery 1.11.2.min-cc83565074b3fa7f2283f7f4d56b90ad171ede87008448ed5d2e91c50575bed1 Found in https://signal.org/assets/vendor/jquery-1.11.2.min-cc83565074b3fa7f2283f7f4d56b90ad171ede87008448ed5d2e91c50575bed1.js<br>Vulnerability info:
Medium 2432 3rd party CORS request may execute CVE-2015-9251 1234
Medium CVE-2015-9251 11974 parseHTML() executes scripts in event handlers 123
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution 123
Medium Regex in its jQuery.htmlPrefilter sometimes may introduce XSS
Maar het belangrijkste laat dit privacy en security raportje zien:
https://webcookies.org/cookies/signal.org/28514434 TLS-SSL afgekapt op F-niveau.
Verdachte code hier:
https://code.jquery.com/jquery-1.11.2.min.js (XSS-DOM scan geeft 43 sources en 19 sinks)
Als CDN gebruiken ze UNPKG -> a la unpkg.com/:package@:version/:file
en dan zitten die weer bij CloudFlare en sluit de cirkelgangzich weer: https://www.shodan.io/host/104.16.125.175
met NivCMS & Zepto. "All your data is/belong to us". Waarvan akte,
luntrus