(评论)
(comments)

原始链接: https://news.ycombinator.com/item?id=43493056

一个Hacker News的帖子讨论了Google Project Zero对NSO公司BLASTPASS iMessage漏洞的分析,该漏洞源于 WebP 图片编解码器中的一个漏洞。 评论者们就使用易造成内存不安全的语言处理编解码器的适宜性展开了辩论,有人主张使用更安全的替代方案。WebP本身的用途也受到了质疑,其一些特性,例如有损图像中的alpha通道,受到了批评。一位评论者建议苹果可以使用Swift创建一个更安全的图像处理库。另一位评论者指出,该漏洞加剧了人们对采用jpegxl的犹豫,并表示支持AVIF。

相关文章
  • 超越 WebP:NSO BLASTPASS iMessage 漏洞分析 2025-03-27
  • (评论) 2024-09-08
  • (评论) 2024-08-12
  • (评论) 2023-12-17
  • (评论) 2025-03-16

  • 原文
    Hacker News new | past | comments | ask | show | jobs | submit login
    Blasting Past WebP - An analysis of the NSO BLASTPASS iMessage exploit (googleprojectzero.blogspot.com)
    28 points by el_duderino 40 minutes ago | hide | past | favorite | 5 comments










    It’s always codecs.

    I don’t always buy into the $safelanguage cargo cult but come on, it’s apparent that memory unsafe languages are not appropriate for this purpose and desperately need replacing.



    skill issue+no serious alternative

    What's the point of WebP anyway?



    No serious alternative? Apple could easily make a safe image handling library in Swift.


    Alpha channels in a lossy image? Animated lossy image?

    Regardless, things like this really help explain the hesitation behind adopting jpegxl.

    I'm a big fan of AVIF files though.



    >Alpha channels in a lossy image?

    Why?

    >Animated lossy image?

    It's called a video







    Join us for AI Startup School this June 16-17 in San Francisco!


    Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact



    Search:
    联系我们 contact @ memedata.com