From e5df512f064b3ab34a5eced600a5251bd9856f86 Mon Sep 17 00:00:00 2001 From: Narsil Date: Mon, 26 Oct 2020 14:39:59 -0400 Subject: [PATCH] Update 'user.js (less connections)' --- user.js (less connections) | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/user.js (less connections) b/user.js (less connections) index c0d6631..581467d 100644 --- a/user.js (less connections) +++ b/user.js (less connections) @@ -1050,9 +1050,9 @@ user_pref("javascript.options.native_regexp", false); // ------------------------------------- // Pref : Disable WebAssembly // Vulnerabilities have increasingly been found, including those known and fixed -// in native programs years ago [2]. WASM has powerful low-level access, making +// in native programs years ago. WASM has powerful low-level access, making // certain attacks (brute-force) and vulnerabilities more possible -// [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising [2][3] +// [STATS] ~0.2% of websites, about half of which are for crytopmining / malvertising // https://developer.mozilla.org/docs/WebAssembly // https://spectrum.ieee.org/tech-talk/telecom/security/more-worries-over-the-security-of-web-assembly // https://www.zdnet.com/article/half-of-the-websites-using-webassembly-use-it-for-malicious-purposes ***/