Ask HN: Why does the US Visa application website do a port-scan of my network?
537 points| mbix77 | 6 months ago
Is this a common thing? I have just recently installed the extension, so I am not sure if there are a lot of other websites who do it.
Since looking into it, I noticed that uBlock Origin already has the default list "Block Outsider Intrusion into LAN" but it wasn't enabled.
edarchis|6 months ago
mrtksn|6 months ago
It actually makes sense to have a paid service that makes this abomination less painful. Though they work with VFS Global for collecting the applications and relevant documents, the VFS Global itself is an abomination and doesn't help with the handling of the form filling anyway.
Recently EU streamlined the Schengen visa application process for Turkish citizens as those "visa agencies" that are the official agencies and the only way to apply for a visa for many countries don't actually help with anything and are scamming people by selling the "good hours" for the visa appointment on the black market. An agency was dropped for this and the scams by agencies were listed among the reasons to streamline the application process.
Both with US and EU people are losing scholarships etc. due to outrageous wait times that are sometimes are years ahead or there's an issue with the systems handling the applications.
I guess there must be an opportunity there to fix all this together with smaller stuff like handling transliteration and character encodings, I wonder if some of those scam site are not scams and actually help with it. An AI agent can be useful here.
testdelacc1|6 months ago
It would be good if the Indian government could block the scammers but I guess it’s a lower priority for the moment.
ChrisRR|6 months ago
unknown|6 months ago
[deleted]
dns_snek|6 months ago
jaimehrubiks|6 months ago
actionfromafar|6 months ago
1oooqooq|6 months ago
it's one hundred per cent clueless privacy invasion. they are probably also opening ports via other means and using that for side channel ID like Facebook does.
just like any other documentation scam, the only weak point is on the "last mile" that's why you will always have a human interviewer.
the visa process is abusive and unpractical because people will work around any hurdle and their kpi will never be affected no matter how crappy they manage to make to whole process. or how many doge kids implement useless privacy invasion tech just because.
karel-3d|6 months ago
https://www.f5.com/
karel-3d|6 months ago
jpeggtulsa|6 months ago
b3lvedere|6 months ago
Never knew that this existed. Thank you!
nerflad|6 months ago
https://github.com/uBlockOrigin/uAssets/issues/4318
adastra22|6 months ago
balamatom|6 months ago
buyucu|6 months ago
dd_xplore|6 months ago
M95D|6 months ago
Using uMatrix was very annoying at first, most websites are broken without their CDNs, but after a few months or so, the whitelist grew and it contains 90% of websites I visit.
On my system https://ceac.state.gov/genniv/ tries to connect to captcha.com, google-analytics, googletagmanager, 127.0.0.1 and "burp" (a local hostname that doesn't exist in my network). Interestigly, the browser console doesn't list connection attempts to localhost or burp. If I allow 127.0.0.1 and "tcpdump -i lo", I see connections to port 8888, which isn't open.
noja|6 months ago
This is a container that FB gives you to host that lives under your domain (it can be your main domain) that slurps up user data and sends it to Facebook from the server side. You embed some JS in your website, and they hoover up the data.
thaumasiotes|6 months ago
That will be this burp: https://portswigger.net/burp/documentation/desktop/tools/pro...
Sounds like they don't want you to analyze their site.
user070223|6 months ago
For those who want to try blocking more stuff you can enable hard mode and bind relax blocking mode keyboard shortcut
I'd recommend also enabling filter lists(I advice yokoffing/filterlists and your region/language)
https://github.com/gorhill/uBlock/wiki/Blocking-mode:-hard-m...
quietfox|6 months ago
samsonradu|6 months ago
sylware|6 months ago
lordofgibbons|6 months ago
It's insane to allow any random website to port scan my LAN. If this wasn't a "feature", I would have considered this a high severity vulnerability
JJJollyjim|6 months ago
(There is some language online suggesting PNA has not actually shipped, but I experienced it myself in stable Chrome several years ago, so I am unsure of the current state).
Firefox doesn't implement either approach -- I assume this is indicative of their lack of development resources.
unknown|6 months ago
[deleted]
e40|6 months ago
"Hacks and Hops" doesn't even have a valid home page. The extension links to https://g666gle.me/ which does not exist. The domain name itself does not want to make me give access to all my data for all websites to them.
As nice as this extension seems, I would ever in a million years install it.
jeffbee|6 months ago
galaxy_gas|6 months ago
1MB of obfuscated fingerprinting + portscan + Webgl . But oddity this one is trying to find burp suite specific route's.
meitham|6 months ago
ahdanggit|6 months ago
dns_snek|6 months ago
Are you seeing connection attempts to other IPs?
junon|6 months ago
Could also be incompetence :D until I fixed it, deploying from my local machine rather than CD resulted in one of the baked in URLs being localhost rather than the public host on the project I'm working on now. Their local development server might just be at port 8888. Wouldn't surprise me.
tifkap|6 months ago
Remember back in June when Facebook/meta got caught tracking users trough a webserver on Android phone thought Messenger and Instagram? Same thing.
See: https://news.ycombinator.com/item?id=44169115 and https://news.ycombinator.com/item?id=44175940
gethly|6 months ago
Although, from personal experience, it used to require java and it worked only on internet explorer and since it has been retired and replaced with chromium, i am not sure what is the way to make it work nowadays, as i have not been able to figure out to use it when i needed the last time.
layer8|6 months ago
cjrp|6 months ago
asimovDev|6 months ago
privacyking|6 months ago
https://news.ycombinator.com/item?id=44169115
inferiorhuman|6 months ago
https://www.digitalsamba.com/blog/metas-localhost-spyware-ho...
palmfacehn|6 months ago
asimovDev|6 months ago
When I visit the site from Safari on macOS I see this in the console. Are there any particular services that use port 8888 for the website to do this?
trod1234|6 months ago
There is also a lot of fingerprintable material within such a port scan from clock skew, TCP ISN, and a few other areas.
You can sieve this quite easily with this available, thanks to Roku's, Phone's, and other things doing this while just sitting locally in a shared collision domain (a digital soldier quartered in every home).
The metadata node graph of devices locally acts as a unique fingerprint once in RFC1918 space, technically not unique but close enough.
vaylian|6 months ago
How does that work? A browser extension can't influence how your router and other machines in your network react to incoming requests.
ale42|6 months ago
Mashimo|6 months ago
est|6 months ago
tmdetect|6 months ago
tmdetect|6 months ago
* uBlock Origin and Lite have it as an option under Filter List > Privacy > Block Outsider Intrusion into LAN
* Brave prevents it, tested with Aggressively block Trackers and Ads.
Maxious|6 months ago
Like a less sophisticated Tor/VPN that is easily detected by port scans
tzury|6 months ago
If you did not go into the details, chances are that when you will, this will turned out to be a false positive case.
If you did, where are the evidence?
unknown|6 months ago
[deleted]
jmclnx|6 months ago
I will give it a try and see what happens and if I see anything I will add it here.
jmclnx|6 months ago
SO, I guess that is going to be used on all my firefox runs.
blablabla123|6 months ago
gepeto42|6 months ago
jhoechtl|6 months ago
77pt77|6 months ago
kolla|6 months ago
SnuffBox|6 months ago
It looks useful and looks good, there's minimal unneeded whitespace and I'm glad it looks as it does. We'd be better off if the entire web switched to a style like this.
bhaney|6 months ago
danw1979|6 months ago
yard2010|6 months ago
Sohcahtoa82|6 months ago
In the 90s and early 00s, we did tons of user-testing and feedback collection. We threw all that research away to create UX's that are minimal and "sleek". Tons of unnecessary whitespace and the concept of "Discovery" just thrown into the dumpster. Skeuomorphism was one of the greatest features of 90s-00s software, ironically thrown away as computers got faster and were able to handle the graphics better.
jansper39|6 months ago
thrown-0825|6 months ago
So much better.
Modern web design is a joke.
AtNightWeCode|6 months ago
trollbridge|6 months ago
jimt1234|6 months ago
davsti4|6 months ago
jeffbee|6 months ago
soursopfarm|6 months ago
[deleted]
jas-|6 months ago
[deleted]
Wowhappyfun|6 months ago
[deleted]
reneberlin|6 months ago
[deleted]
LoadingXD|6 months ago
[deleted]
vkardco|6 months ago
slyall|6 months ago
I remember years back when people would run these firewalls and we'd get complaints from home users about normal traffic.
Thinks like complaints our mail servers was scanning them on port 25 when they sent email.