New issue
Advanced search Search tips

Issue 674505 link

Starred by 1 user

Issue metadata

Status: WontFix
Owner: ----
Closed: Dec 2016
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: ----
Type: ----



Sign in to add a comment

Hackers will not stop harassing me. Embedded webkits within icons and Favicon

Reported by nobodyca...@outlook.com, Dec 15 2016

Issue description

IMPORTANT: Your crash has already been automatically reported to our crash system. Please file this bug only if you can provide more information about it.


Chrome Version: 55.0.2883.87
Operating System: Linux 3.10.18

URL (if applicable) where crash occurred:

Can you reproduce this crash?

What steps will reproduce this crash? (If it's not reproducible, what were you doing just before the crash?)
1.just getting on my Chromebook
2.
3.

****DO NOT CHANGE BELOW THIS LINE****
Crash ID: crash/62650fd880000000

 
Service worker.gdoc
0 bytes Download
Copy of This is the data within the icon that looks like a search magnify glass which enables (1).gdoc
0 bytes Download
I see that these hackers are somehow enterprise enrolling this Chromebook. I purchased this and the other 3 that have been hacked at stores such as Best Buy or Wal Mart, so they are not incorporated with any school or business.  I have found within the web kits that they have actually made a Fed Ex account and using that printer as a gateway to get into the Chromebook.  I am not a developer and honestly don't know a lot about the things I have found, but I can tell you that when there are red flags, exclamation points, errors, up and down the page as well as when I run an audit that something is going wrong and they are on the device and network.  I have found so many odd things over these 2 years plus of getting my life destroyed.  Everything from Lid Switch, to Bad Clock, to enumerator adapters attached to everything,  Fed Ex accounts, to Mojo Public routers, parsers, listeners, embedded data, files that I cannot delete, and the last one was the embedded data within the google doc icon.  Please help me.  I will provide information on how they have infiltrated my devices ranging from Chromebooks to Apple devices, to Android phones.  I can tell you that the Calendars are a huge weak point in the security and I know this sounds bizarre, but I believe the ringtones and journals also play a part in there scheme.  Thank you in advance.  I will try to run a net internal, but they generally make the file so big I cannot attach, even if I zip it.  So, I will run it for just a few seconds and try to attach it.  Well, this one screen shot shows a remote device hooked up and I was right I ran the net internal for 5 seconds and it is 14.6 MB.  I am going to try and cut and paste the actual data I found within the google doc icon. 

 This is the data within the icon that looks like a search magnify glass which enables 


Remote Target
#localhost
Target
Target


<head><meta name="viewport" content="width=device-width, minimum-scale=0.1"><title>l5YP6SGYABGMA3SwujVUnmp10AAAAASUVORK5CYII= (32×32)</title></head>






‰PNG


IHDR  szzôŽIDATx^íÖ»JAà€ ÈÞ¯…ìˆ ¶–6V±ó´
ØI´µìA°²±He+±ÙÒ&ø:þ?́%F÷ŽÍ±°™óÍäÌIJ©M-€€Äq¼êºî…çy¹ïûJ‚çdÔ+ÎuAÉžã8C`öƒ P>wÀ®ïõNomÛN~n†!£Î(|†( «`¸‹¢ˆˆÖ€,ËVtñ‰€*">€øj
@á,ËÚ¨z˜$I¥~(k¼Qªy
3 ؘ^Àùl à˜4ý
žpœ`–êð9¹¢±[€û½†â×(N½j3épm×1Àx=¯Jìz¨
îˆi×$€§ÀIú'»>Ñ×îǾLTÛ°	±æs¡¶ø=ËΉé8Ü\HæC¾ 
' >‚õˆ æ€Åu6û`sÇ2À©t=ã²àýJáo‰ÎÇÏÛðVDÍžKø¢tnš¦Œ’&Ò‹Ú$³ùy`þ’€À7K
£UIæ§]IEND®B`‚




<body dir="ltr" role="application" itemscope="" itemtype="http://schema.org/CreativeWork/DocumentObject"><iframe tabindex="-1" aria-hidden="true" style="position: absolute; width: 9em; height: 9em; top: -99em;"></iframe><iframe tabindex="-1" aria-hidden="true" style="position: absolute; width: 9em; height: 9em; top: -99em;"></iframe><span id="kix-wrapped-iframe" style="position: absolute; top: -50000px; white-space:nowrap; overflow: hidden" aria-hidden="true"><iframe id="kix-hidden-iframe" style="position: absolute; top: -50000px; border: 0; z-index: -50000; width: 50000px" frameborder="0" src="about:blank"></iframe></span><script type="text/javascript" aria-hidden="true">(function() {var iframe = window.document.getElementById('kix-hidden-iframe'); var iframeDocument = iframe ? iframe.contentDocument || iframe.contentWindow.document : null; _docs_webfonts_iframe_fontFaces = _docs_webfonts_createFontFaces(iframeDocument);})();</script><noscript aria-hidden="true">&lt;div class="docs-butterbar-container"&gt;&lt;div class="docs-butterbar-wrap"&gt;&lt;div class="jfk-butterBar jfk-butterBar-shown jfk-butterBar-warning"&gt;JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.&lt;/div&gt;&lt;/div&gt;&lt;br&gt;&lt;/div&gt;</noscript><meta itemprop="name" content="Copy of This is the data within the icon that looks like a search magnify glass which enables" aria-hidden="true"><meta itemprop="faviconUrl" content="https://ssl.gstatic.com/docs/documents/images/kix-favicon6.ico" aria-hidden="true"><meta itemprop="url" content="https://docs.google.com/document/u/0/d/190pEHriGs4F6vDxk6idnC_NfXr5vNIg9caEKUvGhpjM/edit?usp=embed_googleplus" aria-hidden="true"><meta itemprop="embedURL" content="https://docs.google.com/document/u/0/d/190pEHriGs4F6vDxk6idnC_NfXr5vNIg9caEKUvGhpjM/preview?usp=embed_googleplus" aria-hidden="true"><div id="recoil-timer-page-complete" aria-hidden="true"></div><div id="docs-chrome" tabindex="0" role="group" aria-hidden="true"><div id="docs-butterbar-container" class="docs-butterbar-container" aria-live="assertive" aria-atomic="true"></div><div id="docs-chrome-cover-container"><div id="docs-chrome-cover" style="display:none;"></div></div><div><div id="docs-header" class="docs-og-minibar"><div id="docs-branding-container" class="docs-branding-documents docs-branding-homescreen-enabled"><a href="https://docs.google.com/document/u/0/?authuser=0&amp;usp=docs_web" data-tooltip="Docs home" aria-label="Docs home"><div id="docs-drive-logo"></div><div id="docs-branding-logo"></div></a></div><div class="gb_xf gb_Af gb_ab" ng-non-bindable="" id="gb" style="min-width: 100px;"><div class="gb_Ce gb_Cf"><div class="gb_ib gb_Cf gb_R gb_Bf gb_Af"><div class="gb_jc gb_Cf gb_R"><div class="gb_ga" id="gbsfw"></div><div class="gb_fb gb_Jc gb_Cf gb_R"><div class="gb_uc gb_hb gb_Cf gb_R"><a class="gb_b gb_db gb_R gb_9a" href="https://accounts.google.com/SignOutOptions?hl=en&amp;continue=https://docs.google.com/document/u/0/d/190pEHriGs4F6vDxk6idnC_NfXr5v
Screenshot 2016-12-15 at 12.45.23 AM - Display 2.png
375 KB View Download
Labels: -Restrict-View-EditIssue
Status: WontFix (was: Unconfirmed)
Hi,

I'm going to mark this bug WontFix since the crash itself has already been reported to our crash reporting system. I'll see if I can help with some of the other issues you mention:

About enterprise enrollment, that sounds strange. If you click on the clock in the corner, do you see a "This device is managed by..." entry?

About the warnings/errors, I can reassure you that plenty of sites generate warnings and errors in Dev Tools; that is not an indication of a serious problem.

About the "Remote Target" indication, that is a feature used for debugging the mobile version of Chrome from a desktop. Do you perhaps have an Android phone or tablet plugged into your machine when you see "Connected" there?

Hope this helps,

Julia
Oh, I wanted to add:

About the "audit" tab, the warnings/errors there are like the ones in the "console" tab -- they're there for the folks making websites to find mistakes, and don't indicate any problems for you.

Sign in to add a comment