WebKit
mvt
Our great sponsors
WebKit | mvt | |
---|---|---|
151 | 91 | |
7,438 | 9,788 | |
2.5% | 1.8% | |
10.0 | 8.7 | |
about 15 hours ago | 6 days ago | |
Python | ||
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
WebKit
-
GPU Compute in the Browser at the Speed of Native: WebGPU Marching Cubes
Multiple engineers are working on adding it back: https://github.com/WebKit/WebKit/pulls?q=is%3Apr+is%3Aclosed...
-
HTML Streaming and DOM Diffing Algorithm
Since 2023 Chrome announced the View Transition API, and it looks like Safari is also going to support it soon.
-
Towards memory safety with ownership checks for C
One heap per type.
Here’s an allocator optimized for that use case.
https://github.com/WebKit/WebKit/blob/main/Source/bmalloc/li...
-
Bun, JavaScript, and TCO
To use this in Bun, you’d have to start Bun with the environment variable “BUN_JSC_useDollarVM=1” and then $vm.createBuiltin(mySourceCodeString)
When using this intrinsic, if any of the arguments are incorrect or it cannot otherwise enable it, the entire process will probably crash. In debug builds of JSC it will have a nicer assertion failure but that is not enabled in release builds
Example code: https://github.com/WebKit/WebKit/blob/17351231b4dedb62d81721...
also happy to answer any questions about Bun
-
Show HN: Rem: Remember Everything (open source)
Ah, good, let me introduce you to the wonderful world of the Chrome Devtools Protocol! (fka Chrome Remote Debugging Protocol)
I love this API for almost everything browser related. I built my RBI product atop this (BrowserBox: https://dosyago.com), and I think it's a drastically underrated API.
Also, it works out of the box in Edge, Brave, Chromium, and many parts of CRDP are supported by Firefox and Safari^1
1: See for example: https://github.com/WebKit/webkit/tree/main/Source/JavaScript...
- WebGPU now available for testing in Safari Technology Preview
-
Disabling iOS Personalized Ads tells kernel to kill daemon every 3 seconds
No, it's unrelated.
https://github.com/WebKit/WebKit/commit/064df1a9f395f8c6e32c...
- Apple's Safari browser is still vulnerable to Spectre attacks
-
Replacing WebRTC: real-time latency with WebTransport and WebCodecs
It's being worked on now: https://github.com/WebKit/WebKit/pull/17320
-
iLeakage: Browser-Based Timerless Speculative Execution Attacks on Apple Devices
It is different. The cross-site navigation flag is a couple of years old. It was enabled by default for iOS in November 2018 for example https://github.com/WebKit/WebKit/commit/e191fc8c412850cb9fd0...
mvt
-
Exploiting the iPhone 4
Amnesty International released Mobile Verification Toolkit to check your phone for malware, by checking encrypted backups on your computer. https://github.com/mvt-project/mvt
-
Meduza co-founder's phone infected with Pegasus
From what I was able to read previously, it has no ability to spread by itself and has to be installed by a targeted attack. There is also a tool from Amnesty International that can detect it (or was able to): https://github.com/mvt-project/mvt
It is a race though, so past info may no longer be valid. However, I doubt it will ever be able to spread by itself, since it uses very expensive zero days to infect and they will be quickly fixed after detection.
-
NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild
Public Service Announcement:
Amnesty International has a program on GitHub with Citizens Lab for those keeping an eye out for additional protections
https://github.com/mvt-project/mvt
MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.
-
As recommended, I ask it here : how can I find out if my phone is being tapped, and what should I do if it is?
You can do a backup of your phone and analyze said backup using digital forensics to see if for example "automated software" will detect any of the more mainstream spyware/hacks. You can use mobile verification toolkit (mvt) to do this, but it won't detect everything. It is however a good start, you can investigate the basic results with limited knowledge and if something is detected you can further it up to a digital forensics company because it will very highly likely be beyond your qualifications to analyze by yourself. Hope this helps.
- How do I download this on iPhone
-
I dont know if i downloaded malware
I was extremly paranoid i got a virus a few months ago and i think i may have downloaded something. Its been more thank half a year and just remebered that i tried to download something from here,https://github.com/mvt-project/mvt i dont know if i was even sucessful, i am fully updated ios, cant find anything in files so i dont think i had it for very long and prob dealted after a whille
- iOS 16.5.1 TriangleDB spyware
-
Can anyone hack my phone via sending a WhatsApp Photo? How to know it?
If you wanna check your phone, maybe try using this: https://github.com/mvt-project/mvt
- Disabling Apple from Spying on You
-
Extent of getting hacked for iPhone vs Android
if android, this is available -- https://github.com/mvt-project/mvt
What are some alternatives?
chromium - The official GitHub mirror of the Chromium source
hardened_malloc - Hardened allocator designed for modern systems. It has integration into Android's Bionic libc and can be used externally with musl and glibc as a dynamic library for use on other Linux-based platforms. It will gain more portability / integration over time.
otter-browser - Otter Browser aims to recreate the best aspects of the classic Opera (12.x) UI using Qt5
whatsapp-media-decrypt - Decrypt WhatsApp encrypted media files
cname-trackers - This repository contains a list of popular CNAME trackers
WhatsDump - Extract WhatsApp private key from any non-rooted Android device (Android 7+ supported)
fingerprintjs - Browser fingerprinting library. Accuracy of this version is 40-60%, accuracy of the commercial Fingerprint Identification is 99.5%. V4 of this library is BSL licensed.
AMDH - Android Mobile Device Hardening
gecko-dev - Read-only Git mirror of the Mercurial gecko repositories at https://hg.mozilla.org. How to contribute: https://firefox-source-docs.mozilla.org/contributing/contribution_quickref.html
XiaomiADBFastbootTools - A simple tool for managing Xiaomi devices on desktop using ADB and Fastboot
uBlock-Safari - uBlock Origin - An efficient blocker for Chromium, Firefox, and Safari. Fast and lean.
plaso - Super timeline all the things