• xthexder@l.sw0.com
    link
    fedilink
    arrow-up
    19
    arrow-down
    2
    ·
    27 days ago

    I’ll be honest, I have more concerns about this site potentially logging my license plate than I do of someone having already looked it up.

    It’s a little like if haveibeenpwned asked you for your password to check if it’s been leaked.

    • doodoo_wizard@lemmy.ml
      link
      fedilink
      arrow-up
      4
      ·
      27 days ago

      What would you say is a better way to allow users to check if their password is in, last time I looked, over a petabyte of data breaches than to have them enter it?

      • xthexder@l.sw0.com
        link
        fedilink
        arrow-up
        5
        arrow-down
        1
        ·
        edit-2
        27 days ago

        For data leaks, haveibeenpwned only requires your email, and they send you a notification if it ever shows up. They don’t actually check passwords.

        Unfortunately there’s no secondary info linked with a license plate that makes doing this sort of notification private without just downloading the full database locally.

        • doodoo_wizard@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          27 days ago

          Apologies, I didn’t want to assume you knew how hibp works based only on your verbiage. I think I misread your comment and assumed you were implying they werent trustworthy or something.

          Out of curiosity, what do you think the vector of attack would be if someone had a honeypot of tokens they were offering people a look at?

          Get the browsers unique id and tie it to the token they’re asking about? How would that not be defeated by naming a bunch of queries about extant tokens?

          The problem I see is that there’s this public knowledge thing, the license tag number, and it requires monitored access to a restricted system in order to correlate that public piece of information to a human being. So would just fuzzing requests with tags in the db work?

          • xthexder@l.sw0.com
            link
            fedilink
            arrow-up
            3
            ·
            27 days ago

            The sort of information they could gather from a site like this would be a list of license plates that somebody is worried about being tracked. I can think of several government organizations who would love that sort of information right now.

            It’s a sort of Streisand effect

            • doodoo_wizard@lemmy.ml
              link
              fedilink
              arrow-up
              2
              ·
              26 days ago

              Yeah but do you think that a frontend that makes ten requests for tags, including somewhere between 3 and 6 tags in the db and between 3 and 6 tags not in the db with the actual tag the user wants to know about as well would add enough obfuscation to prevent that?

    • kumi@feddit.online
      link
      fedilink
      English
      arrow-up
      2
      ·
      27 days ago

      If you check it with Tor Browser in a clean VM, you are not leaking much more than the plate number as such (which I wouldn’t say has the same sensitivity as a password) and the time of lookup. Obviously not safe to use this from your normal smartphone or home IP.

      • TragicNotCute@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        27 days ago

        We’re talking about a government sponsored surveillance operation. I promise you they already know which license plates belong to you. I’m not sure I understand the risk here.