• Andromxda 🇺🇦🇵🇸🇹🇼@lemmy.dbzer0.comOP
      link
      fedilink
      English
      arrow-up
      39
      ·
      4 months ago

      You can check this yourself. Just paste this into the developer console:

      chrome.runtime.sendMessage(
        "nkeimhogjdpnpccoofpliimaahmaaome",
        { method: "cpu.getInfo" },
        (response) => {
          console.log(JSON.stringify(response, null, 2));
        },
      );
      

      If you get a return like this, it means that the site has special access to these private, undocumented APIs

      {
        "value": {
          "archName": "arm64",
          "features": [],
          "modelName": "Apple M2 Max",
          "numOfProcessors": 12,
          "processors": [
            {
              "usage": {
                "idle": 26890137,
                "kernel": 5271531,
                "total": 42525857,
                "user": 10364189
              }
            }, ...
      
    • tal@lemmy.today
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      1
      ·
      4 months ago

      Not an area I’m familiar with, but this user says no:

      https://news.ycombinator.com/item?id=40918052

      lashkari 5 hours ago | prev | next [–]

      If it’s really accessible from *.google.com, wouldn’t this be simple to verify/exploit by using Google Sites (they publish your site to sites.google.com/view/<sitename>)?

      DownrightNifty 5 hours ago | parent | next [–]

      JS on Google Sites, Apps Script, etc. runs on *.googleusercontent.com, otherwise cookie-stealing XSS >happens.