security-research VS csswg-drafts

Compare security-research vs csswg-drafts and see what are their differences.

security-research

This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. (by google)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
security-research csswg-drafts
40 70
2,852 4,278
1.1% 0.8%
9.2 9.9
7 days ago 2 days ago
C Bikeshed
Apache License 2.0 GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

security-research

Posts with mentions or reviews of security-research. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-07.
  • Weird things engineers believe about Web development
    2 projects | news.ycombinator.com | 7 Jan 2024
    > Alright, let's take a step back. First, I am not a mobile developer.

    I think you're whichever kind of developer your current position requires. You've been talking about Android non-stop throughout this conversation, and conversations you've had with others on this website [1]. When you were lambasting me about my perceived knowledge of mobile development you were touting your Android knowledge. Now that I've proven Android is actually one of the primary tools Google uses to promote Chrome (and you admitted you don't know much about iOS) you want to distance yourself from mobile development altogether.

    > Other examples include whatever iOS does (which I don't know), containers (docker and the likes), VMs, and everything in-between (like what snap or flatpak use).

    We're not discussing theoretical means with which you could sandbox an application, we're talking about how apps are actually used in reality. If you need to fire up a virtual machine every time you use your favorite desktop apps, then you're only proving my point that they're not inherently very secure. Not to mention, the average user probably has no idea what Docker or a virtual machine even is. Like I said in my original response, lots of things are possible in theory, but in practice web browsers are much better at sandboxing apps than desktop operating systems (and even better than mobile operating systems).

    > If anything, modern browsers are so complex (and getting worse with time) that the attack surface is big

    Ironically, a lot of that complexity arises from the web's insistence on security. V8 is complex because it has so many safeguards in place to sandbox JavaScript, and that sandboxing is taken very seriously. There's a reward anywhere from 10,000 to 150,000 USD if you can escape the sandbox [2][3]. Browsers are inherently more secure than desktop apps because they limit access to the underlying platform. Someone developing malware as a web app has to first escape the browser sandbox, just to gain the privileges that a desktop app has natively. If it helps, you can think of every desktop app as a webapp which has already escaped the browser.

    > Moreover, Web UIs bring their own class of issues that don't really apply to native apps.

    No, web developers have just spent so much time thinking about security, that native app developers haven't even realized these security issues are relevant yet. It took years for Apple and Google to come to the brilliant conclusion that they should notify users when an app is reading from the clipboard, something which at the time was considered just a Browser "class of issue". Maybe in 2034 they'll figure this out for desktop apps.

    > But CORS is really a browser thing, I don't think it really makes sense to compare it to anything outside the "webview world".

    It makes sense to compare it to things outside of the browser because it protects users and servers. You seem to want to disqualify any point I make that you can't disprove. If you don't think web technology is comparable to anything outside the browser, then what are we even arguing about? This whole discussion has been about comparing the security of web apps to non-web apps.

    > If security is your concern (and you seem to insist that it is), then webapps are really not better than the alternatives. Actually, the Apple Store and the Play Store (to give an example in the mobile world) allow Apple and Google to somehow monitor the apps that users install, which is most certainly more secure than a model where anyone can load any webapp from any website.

    Apple and Google have to monitor which apps make it to their app stores, BECAUSE apps are so much more prone to security problems. You once again have it completely backwards. No one has to gatekeep websites because browsers are so much better at sandboxing applications. And allow me to remind you that admitted you have no idea how iOS sandboxing works, so you can't really be confident about this stance even if it did make sense.

    And now you're arguing in favor of the app store duopoly which contradicts your point about software diversity. You can't have it both ways. You're trying to hold on to two contradictory points at the same time: you don't like the supposed lack of Browser diversity (which is why you seem to detest Chromium), but you like the supposed security guarantees of the mobile app store duopoly, which is even less diverse.

    [1] https://news.ycombinator.com/item?id=38919389

    [2] https://github.com/google/security-research/blob/master/v8ct...

    [3] https://bughunters.google.com/about/rules/5745167867576320/c...

  • One shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerability
    1 project | /r/linkersec | 23 Nov 2023
    This research is also available in text form.
  • Would we still create Nebula today?
    14 projects | news.ycombinator.com | 13 Oct 2023
    But both Nebula and tinc max out at around 1 Gbit/s on my Hetzner servers, thus not using most of my 10 Gbit/s connectivity. This is because they cap out at 100% of 1 CPU. The Nebula issue about that was closed due to "inactivity" [2].

    I also observed that when Nebula operates at 100% CPU usage, you get lots of package loss. This causes software that expects reasonable timings on ~0.2ms links to fail (e.g. consensus software like Consul, or Ceph). This in turn led to flakiness / intermittent outages.

    I had to resolve to move the big data pushing softwares like Ceph outside of the VPN to get 10 Gbit/s speed for those, and to avoid downtimes due to the packet loss.

    Such software like Ceph has its own encryption, but I don't trust it, and that mistrust was recently proven right again [3].

    So I'm currently looking to move the Ceph into WireGuard.

    Summary: For small-data use, tinc and Nebula are fine, but if you start to push real data, they break.

    [1]: https://github.com/gsliepen/tinc/issues/218

    [2]: https://github.com/slackhq/nebula/issues/637

    [3]: https://github.com/google/security-research/security/advisor...

  • How Cloudflare is staying ahead of the AMD vulnerability known as “Zenbleed”
    1 project | news.ycombinator.com | 26 Jul 2023
    You can run the PoC if you want: https://github.com/google/security-research/tree/master/pocs...
  • Finding Gadgets for CPU Side-Channels with Static Analysis Tools
    1 project | /r/blueteamsec | 1 Jul 2023
    1 project | /r/netsec | 29 Jun 2023
  • Ask HN: Real-life, ridiculous security incidents?
    1 project | news.ycombinator.com | 2 Jun 2023
    * Visual Studio Code had a Remote Code Execution vulnerability triggered by a simple link https://github.com/google/security-research/security/advisor...
  • RET2ASLR - return instructions from other processes can leak pointers through the Branch Target Buffer (BTB) in a reversed spectre-BTI like scenario
    1 project | /r/netsec | 11 May 2023
  • Linux Kernel Spectre v2 SMT mitigations
    1 project | news.ycombinator.com | 16 Apr 2023
  • Share some of your favourite Free Downloads!
    1 project | /r/Beatmatch | 31 Mar 2023

csswg-drafts

Posts with mentions or reviews of csswg-drafts. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-23.
  • Help us invent CSS Grid Level 3, a.k.a. "Masonry" layout – WebKit
    5 projects | news.ycombinator.com | 23 Apr 2024
    For more background, and some detailed discussion of the opposite argument ("display: masonry" over "display:grid"+"grid-template-rows: masonry") see https://github.com/w3c/csswg-drafts/issues/9041
  • Chrome Dev: High Definition CSS Color Guide
    1 project | news.ycombinator.com | 7 Apr 2024
    The tracking issue: https://github.com/w3c/csswg-drafts/issues/8659

    As noted there, okHSL/HSV keeps the perceptual uniformity by removing some peaks beyond the geometric limit of HSL/HSV, and it is unclear whether it is what users do expect or not.

  • Announcing Winduum 1.0 - Framework agnostic component library for TailwindCSS
    5 projects | dev.to | 29 Feb 2024
    The idea is that you should be able to set accent color via accent-color CSS property. It is discussed that there should be access to the color value of this property, e.g. via AccentColor or AccentColorText.
  • Learn CSS Layout the Pedantic Way
    7 projects | news.ycombinator.com | 27 Feb 2024
    What do you mean by "official documentation"? The specification [1]? MDN [2]?

    [1] https://drafts.csswg.org/

    [2] https://developer.mozilla.org/en-US/docs/Web/CSS

    The former is not meant as a learning resource for new web devs and the latter usually has information about the "baseline" support ond browser compatibility tables.

  • CSS WG resolved to officially work on native custom functions and mixins
    1 project | news.ycombinator.com | 13 Feb 2024
    The link corresponding to the actual submission title (“CSS WG resolved to officially work on native custom functions and mixins”):

    https://github.com/w3c/csswg-drafts/issues/9350#issuecomment...

    > RESOLVED: Start ED of css-mixins for CSS Custom Functions and Mixins

  • Weird things engineers believe about Web development
    2 projects | news.ycombinator.com | 7 Jan 2024
    Recently I was reading the Learn CSS the pedantic way book and the definition for inline boxes did not match the way that anonymous block boxes were generated when an inline-level element had a block-level element as its child. So I went looking elsewhere for a more appropriate definition for that case and found this issue on standards: https://github.com/w3c/csswg-drafts/issues/1477 It was really interesting to know that I was not the only one confused. My question was: Does the inline-box generated by the inline-level element contains the box generated by the block-level child or there wasn't an inline-box that was a parent of them all but there were 2 siblings inline-level boxes of the block-level box that were wrapped in another anonymous block boxes? Reading that issue I got to know the concept of fragments, which I did not know browsers had. But the issue seems to suggest that the box tree for this case should have the inline-box as being a parent of the block-box. Which led me to another question, in that case, if I apply a border to the parent inline-level element, shouldn't it apply to the overall box that is generated (it does not)? The answer is that borders between block-boxes and inline-level boxes should not intersect but that is really difficult to derive from reading the standards alone. Anyway it was headache-inducing trying to learn the box-model pedantically :)
  • CSS Is Fun Again
    8 projects | news.ycombinator.com | 27 Dec 2023
    With all the recent CSS improvements I still miss the possibility to have working transition to "height:auto". The issue [1] on csswg-drafts is the most upvoted one. At least we can now use css grid and track sizes transitions, but it's far from intuitive, transition for "height:auto" should just work.

    [1]: https://github.com/w3c/csswg-drafts/issues/626

  • Proposed "au" unit for CSS provides for styling on an astronomical scale
    1 project | news.ycombinator.com | 5 Dec 2023
  • The Future of CSS: Easy Light-Dark Mode Color Switching with Light-Dark()
    5 projects | news.ycombinator.com | 9 Oct 2023
    Masonry isn’t ready to be shipped as there are still quite a few open spec issues [^1] that need to be resolved first.

    [^1]: https://github.com/w3c/csswg-drafts/issues?q=is%3Aissue+is%3...

  • CSS Solves Auto-Expanding Textareas
    2 projects | news.ycombinator.com | 30 Sep 2023
    the irc log is here: https://github.com/w3c/csswg-drafts/issues/7542#issuecomment...

    i had the same reaction, it seems like a very weird syntax. but after reading the discussion i get it: you're telling a form field to behave like a normal html element, instead of behaving like a form field.

What are some alternatives?

When comparing security-research and csswg-drafts you can also consider the following projects:

gcp-dhcp-takeover-code-exec - Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent

Modernizr - Modernizr is a JavaScript library that detects HTML5 and CSS3 features in the user’s browser.

tailscale - The easiest, most secure way to use WireGuard and 2FA.

open-props - CSS custom properties to help accelerate adaptive and consistent design.

security-research-1 - This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.

WHATWG HTML Standard - HTML Standard

wuffs - Wrangling Untrusted File Formats Safely

Rotativa - Rotativa, /rota'tiva/. Make Pdf from Asp.Net MVC. Available on Nuget https://www.nuget.org/packages/Rotativa

clients - Bitwarden client applications (web, browser extension, desktop, and cli)

rellax - Lightweight, vanilla javascript parallax library

wesher - wireguard overlay mesh network manager

container-query-polyfill - A polyfill for CSS Container Queries