The Web Design Group

... Making the Web accessible to all.

Welcome Guest ( Log In | Register )

 
Reply to this topicStart new topic
> Security when viewing local static html files, Browser security
joej
post Oct 20 2016, 09:03 AM
Post #1





Group: Members
Posts: 2
Joined: 20-October 16
Member No.: 24,895



First of all I would like to say hello to all.

I am here looking for some answers regarding static HTML files and local browser security.

I am wanting to use some local HTML files as a GUI for keeping some hard coded, hobby related, non sensitive data for personal use.

The files will be static but will include some j query to show and hide divs etc. No server will be involved. These files will include some links to open on-line websites.

My concern is, will using these files locally without a server be a security risk (can anyone access my PC/phone/tablet etc whilst I am viewing these files through a browser).

Joe
User is offlinePM
Go to the top of the page
Toggle Multi-post QuotingQuote Post
pandy
post Oct 20 2016, 10:33 AM
Post #2


🌟Computer says no🌟
********

Group: WDG Moderators
Posts: 20,730
Joined: 9-August 06
Member No.: 6



No, I don't think there is an added risk. The risk will be the same as when you visit those other sites on the web without your local files involved.
User is offlinePM
Go to the top of the page
Toggle Multi-post QuotingQuote Post
Christian J
post Oct 20 2016, 03:42 PM
Post #3


.
********

Group: WDG Moderators
Posts: 9,653
Joined: 10-August 06
Member No.: 7



QUOTE(joej @ Oct 20 2016, 04:03 PM) *

First of all I would like to say hello to all.

Hi and welcome

Viewing your own safe content locally shouldn't be dangerous. In fact most web pages might be more risky, due to malicious scripts being served from advertizing networks.

But (in my poor understanding) a compromised local page might do more damage than a compromised web page, due to less security restrictions locally. See https://blog.chromium.org/2008/12/security-...-web-pages.html for examples on how various older browsers tried to prevent that (no idea if it still applies today).

Note that this only applies if the browser runs malicious javascript, e.g. from an email (in addition to your local web page?). It could also happen if you'd load e.g. a jQuery library from a compromised hosting site (so it might be safer to use a local copy).




User is offlinePM
Go to the top of the page
Toggle Multi-post QuotingQuote Post
joej
post Oct 21 2016, 12:18 AM
Post #4





Group: Members
Posts: 2
Joined: 20-October 16
Member No.: 24,895



Thanks to both of you for taking the time to reply.

I have been keeping and viewing HTML records (non sensitive data) like this for quite some time now mainly for the GUI and learning side of coding and never had a problem, but I had a friend ask me if using this method could be some sort of security risk. This got me thinking even though I was almost certain it was not but thought asking the more experienced could not hurt. I guess anything is possible with code, and I think the key words here are "sensitive data".

Interesting link Christian J, (6am here in the UK, :-() yawn!... gotta give that some more study later this evening after work.) I always use links to local copies of jQuery/framework libraries etc, then download an updated file if need be.

Thanks again, very helpful and have a good day.
User is offlinePM
Go to the top of the page
Toggle Multi-post QuotingQuote Post
Christian J
post Oct 21 2016, 09:20 AM
Post #5


.
********

Group: WDG Moderators
Posts: 9,653
Joined: 10-August 06
Member No.: 7



One way to compromise a browser might be through browser addons/extensions/toolbars. An addon might be legitimate when you first install it, but is later sold by the developer to someone else, and then changed into a malicious version through its automatic updates. I don't know if malicious addons can access your OS's file system, that might require further browser exploits to circumvent the checks mentioned in the link above.

In any case I assume malware from spam emails, ads, addons etc tries to target as many people's computers as possible, and is maybe not written to exploit the very few browsers that open local files. It's a completely different scenario if someone already knows that you use local files and tries to exploit that ("spearfishing"), and might be much harder to protect yourself against.
User is offlinePM
Go to the top of the page
Toggle Multi-post QuotingQuote Post

Reply to this topicStart new topic
1 User(s) are reading this topic (1 Guests and 0 Anonymous Users)
0 Members:

 



- Lo-Fi Version Time is now: 20th April 2024 - 09:28 AM