logoalt Hacker News

hvb2today at 6:48 AM5 repliesview on HN

This feels like such a weird ask?

Why would anyone do this, so their content can be easily read elsewhere potentially with a load of ads surrounding it?

This seems to really reason through only the happy path, ignoring bad actors, and there'll always be bad actors.


Replies

sheepttoday at 7:53 AM

If a malicious website wanted to copy a blog's website to put ads on it, they already can just copy it outside of the browser on their end, which has the "benefit" of preventing the original blog from taking the post down.

CORS also doesn't prevent a popular website with a personal vendetta[0] against a blogger from DDOSing the blog with their visitors, since CORS doesn't block requests from being sent.

For a purely static website, there shouldn't be any risk from enabling CORS.

[0]: https://news.ycombinator.com/item?id=46624740

onion2ktoday at 7:20 AM

This seems to really reason through only the happy path, ignoring bad actors, and there'll always be bad actors.

True, but the bad actors can defeat any security mechanism you put in place with a proxy, or a copy'n'paste, so the downside risk is pointless worrying about. The upside of allowing traffic is that your content that you presumably want people to read can be read by more people. For all but the most popular blogs that's probably a net benefit.

ef2ktoday at 7:08 AM

To be fair, they do explain their motivation. It's an in-browser RSS reader, so it's fetching the RSS feed directly without a proxy server. There's not much risk since the content is public and non-credentialed. The bigger risk is misconfiguring CORS and inadvertently exposing other paths with the wildcard.

bigstrat2003today at 7:01 AM

Also, why would an RSS reader be a website? An application installed on your PC is superior in every way.

show 1 reply
trick-or-treattoday at 10:09 AM

[dead]