The attack vector can also be spread through a .webp file renamed as .jpg
I'm also a bit of a computer dummy. Are you saying that if the file is converted to jpeg format (using xnview or similar program) it can still contain the attack vector?
Just replace the .webp extension to .jpg and the browser will still load it.
Ok, I get it. It's spread through the browser by clicking on the link (so it doesn't matter what webp images I've saved from the internet). I just need to re-install my OS and disable webp support.
And of course there's no way to disable only webp support from webkit based browsers such as chromium or brave...
I guess everyone's stuck with firefox
Better safe than sorry. That's why I use several VM for online and dev related stuff. Restoring a snapshot can easily fix that kind of issue in seconds (M.2 SSD).
(post is archived)