Thanks for the detailed explanation.
I understand the technical point of view and yes, they definitively wrote on their lemmy.world “copy” of this thread given how the fediverse work, tho they should be able to see which instance each post originates from.
I most probably worded my answer very poorly, I was at a loss of words, not only because of what I perceived as incoherent behaviour, but also because of the circumstances.
I mean, I’m a lemm.ee “refugee” like many in this thread, I registered here only 2 days ago, still very sad for the loss of .ee, the admins wrote a fantastic welcome post for all of us, and of all the things they could say they come here to remark what they think of the domain? Seriously ?!?
possiblylinux127@lemmy.zip 9 months ago
It seems more like a issue with applications honestly
DNS shouldn’t be the source of a compromise
swizzlestick@lemmy.zip 9 months ago
And a TLD shouldn’t be so easy to mistake for one of the most recognisable filetypes ever, yet here we are. Well made apps discern between a zip file and a zip web address without issue. The problem, as usual, is in the human element:
holidayphotos2025.zip,2025ProductData.zipor whatever hook you’re going for.Having .zip in the string and in the link visible on hover could be all that is needed to ‘sell’ it to a user that makes a cursory glance before clicking - nevermind the ones that just click anyway. Plenty of folk have fallen for more obvious traps than that, so it’s a winner for a bad actor. Any trick that lends legitimacy to a scam increases the chance of success. Users savvy enough to check but not enough to spot the discrepancy may also have more data interesting to an attacker.
Blocking .zip TLDs wholesale at DNS level kills this even if the first and hardest hurdle (getting the user to click) is cleared. I’ll concede that it is an edge case in the grand scheme of things, but why leave the hole open when it is so easily plugged?
possiblylinux127@lemmy.zip 9 months ago
I still don’t see how that is an issue. If someone clicks on a link from a email and then gets compromised there is a bigger issue.
swizzlestick@lemmy.zip 9 months ago
Throw enough people at something, and one of them will fail. The more people, the higher the chance.
Perfect people in a perfect world would not need fire extinguishers, seatbelts, helmets, endpoint protection software, or TLD level blocks. You can try to train the problem out of people, but the threat still exists, mistakes can be made, and the next 0day might be just around the corner.
I’m not a fan of sorting people problems out with tech based solutions either - I see your point. The pragmatist in me will take that over dealing with the fallout of user error though.