No Homo Graphs od em_te
No Homo Graphs is a browser add-on that identifies websites which are spelled similar to a user-defined list of domains. Using modal dialogs, No Homo Graphs prompts you to be careful when you visit those websites to avoid being a victim of phishing.
Pro používání tohoto rozšíření potřebujete Firefox
Metadata rozšíření
Snímky obrazovky
O tomto rozšíření
About this Add-on
Using computer algorithms, No Homo Graph checks in real-time to see if websites you visit are spelled similar to a user-defined list of domains. If similar matches (a.k.a. homo-graphs) are found, a modal dialog is shown preventing you from interacting with the website until you indicate awareness of the risks involved. The modal dialog is modal to the website only and doesn't prevent you from switching tabs or replacing it with another website altogether. The user-defined list of domains is populated with popular domains like PayPal, Western Union, Google, Yahoo, MyEtherWallet and MoneyGram and the user is free to add and remove from the list.
For example, it will catch things like "paypaᶘ.com" if you have "paypal.com in your list.
How No Homo Graph Works
When you visit a website, this add-on parses the second-level and third-level domain from the URL and calculates the difference between them and the domains in your user-defined list. If the domains are puny-code encoded, they will be converted to Unicode. If the domains contain Cyrillic characters that look like Ascii characters, they will be converted into Ascii. If the difference is below a threshold (2 permutations if the domain is less than 7 characters excluding the TLD), it will alert the user that a match was found.
What are the Limitations?
This add-on is not fool-proof. An attacker can simply make more changes to the domain until it is different enough. But then it becomes easier to spot with the naked eye.
How is my Information Stored?
All info is stored locally on your computer.
What are Homo-Graph Attacks?
See these links:
https://slashdot.org/story/02/05/28/0142248/spoofing-urls-with-unicode
https://dev.to/loganmeetsworld/homographs-attack--5a1p
Example attacks:
https://xn--80aa0cbo65f.com (fake paypal.com)
https://www.xn--80ak6aa92e.com (fake apple.com)
http://www.xn--o1aae.com (fake cnn.com)
Using computer algorithms, No Homo Graph checks in real-time to see if websites you visit are spelled similar to a user-defined list of domains. If similar matches (a.k.a. homo-graphs) are found, a modal dialog is shown preventing you from interacting with the website until you indicate awareness of the risks involved. The modal dialog is modal to the website only and doesn't prevent you from switching tabs or replacing it with another website altogether. The user-defined list of domains is populated with popular domains like PayPal, Western Union, Google, Yahoo, MyEtherWallet and MoneyGram and the user is free to add and remove from the list.
For example, it will catch things like "paypaᶘ.com" if you have "paypal.com in your list.
How No Homo Graph Works
When you visit a website, this add-on parses the second-level and third-level domain from the URL and calculates the difference between them and the domains in your user-defined list. If the domains are puny-code encoded, they will be converted to Unicode. If the domains contain Cyrillic characters that look like Ascii characters, they will be converted into Ascii. If the difference is below a threshold (2 permutations if the domain is less than 7 characters excluding the TLD), it will alert the user that a match was found.
What are the Limitations?
This add-on is not fool-proof. An attacker can simply make more changes to the domain until it is different enough. But then it becomes easier to spot with the naked eye.
How is my Information Stored?
All info is stored locally on your computer.
What are Homo-Graph Attacks?
See these links:
https://slashdot.org/story/02/05/28/0142248/spoofing-urls-with-unicode
https://dev.to/loganmeetsworld/homographs-attack--5a1p
Example attacks:
https://xn--80aa0cbo65f.com (fake paypal.com)
https://www.xn--80ak6aa92e.com (fake apple.com)
http://www.xn--o1aae.com (fake cnn.com)
Ohodnoťte svou zkušenost
OprávněníZjistit více
Tento doplněk potřebuje:
- Přistupovat k aktivitám prohlížeče během prohlížení
- Přistupovat k vašim datům pro všechny webové stránky
Další informace
- Odkazy doplňku
- Verze
- 0.2.5
- Velikost
- 34,22 KB
- Poslední aktualizace
- před 4 lety (19. bře 2020)
- Příbuzné kategorie
- Licence
- Licence MIT
- Historie změn
Přidat do sbírky
Poznámky k verzi 0.2.5
Now normalizes non-ascii user input before saving them as domain names
Další doplňky od autora em_te
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno
- Zatím nehodnoceno