alt.hn

4/11/2026 at 9:37:20 AM

BlueHammer abuses Windows Defender's update process to gain SYSTEM access

https://hackingpassion.com/bluehammer-windows-defender-zero-day/

by BullsEye0

4/11/2026 at 10:37:45 AM

Breaking text selection is a VERY user-hostile web development trick. Thank you, seriously.

by zx8080

4/11/2026 at 11:11:36 AM

This website is one of the most user hostile I’ve encountered in a long time. On mobile it’s miserable.

by stingraycharles

4/11/2026 at 11:15:45 AM

Is it meant to be ironic? It's also including a smooth-scroll.js, clipboard.js (No Flash. No frameworks. Just 3kb gzipped)

by duskdozer

4/11/2026 at 10:02:32 AM

Interesting but your site renders very badly on mobile; I have to scroll down through four screenfuls of ads or blank padding before I see a single paragraph of article, then more blank page. It is visually indistinguishable from an adfarm. Could you fix that?

by smcin

4/11/2026 at 11:02:07 AM

More like ads passion, truly a lot of better results from searching using your favourite search index..

by meandmycode

4/11/2026 at 11:21:49 AM

Site renders great for me, iOS Safari with blockers; text selection works fine.

Yeah, I know, karma hit coming, but the other comments are so counter to my experience (I quite like the page and content) that I could not not comment.

by PeterWhittaker

4/11/2026 at 11:42:57 AM

Same for me (brave android). The blocking of text selection is annoying tho.

by fenykep

4/11/2026 at 11:06:51 AM

If native code is running on your Windows (as opposed to JavaScript in the browser sandbox), you've already lost.

It can steal your cookies and browser saved passwords, it can upload your photos or delete them.

Privilege escalation to SYSTEM is the least of your worries.

by dist-epoch

4/11/2026 at 11:20:03 AM

More or less, no desktop OS other than Qubes and MacOS (to a very limited extent) can handle the user being even vaguely compromised, much less a user with privilege. Keys to the kingdom are already in the user domain, SSH keys, all your emails and photos, contacts, access to other devices in your network. The user can backdoor themselves to get passwords by modifying their own environment, can escalate by modifying the DNS settings of the users browser to gain more access. Root access by and large is completely irrelevant.

by drum55

4/11/2026 at 10:51:05 AM

[dead]

by redsocksfan45