smartypants OP wrote (edited )
Reply to comment by Wahaha in WARNING !!!!! ZERO Day exploit in fake JPGs being served to Browsers. A revealed exploit on July 21 2021 to add to long list of remote WebP exploits, and now CATBOX suddenly involved! by smartypants
no time to go through all solutions, but this plugin from 12 months ago should do the trick at a perfect brute force way, but I dont know if a bad actor can use browser fingerprint to shove it in anyway.
https://addons.mozilla.org/en-US/firefox/addon/dont-accept-webp/
This extension monitors and edits request headers using the onBeforeSendHeaders API
TRY THAT PLUGIN.
If it works, vile web sites like youtube should show blank white squares for video previews.
many http web development tools including free ones, can do ANYTHING with any data sent or received from firefox and have persistent scripts. "ModHeader" is one fun one.
Wahaha wrote (edited )
I'm already using that one for a long time, since webp generally sucks. But it only works if there's a choice between webp and jpg, if there is no choice, I'll get to see webp.
Viewing a single comment thread. View all comments