Conversation

It doesn't break a class of malicious sites. That's a misrepresentation of it. The only thing that it accomplished is a one time adjustment by the adversaries. It only addressed one way this was being detected, and they had the time they needed to adjust. Code is still there.
1
Incognito is no harder to detect than before. There is no way to present the software as having improved privacy. The adversaries weren't prevented from doing it for any period of time. They weren't even inconvenienced in any substantial way but rather had to update a library.
1
Replying to and
yes, so they had to update a library, and that means the attack didn't work for a period of time. That's quantifiable, and you're acting like it isn't. You're a proponent of setting goals and measuring success in metrics of goal achievement, but if your declared goal was privacy
2
There was never a point in time where it was prevented. You can't even claim what you're trying to claim because the feature wasn't developed in secret and then launched as a surprise way to temporarily disrupt privacy-invasive code. That would be quite silly, and didn't happen.
1
Replying to and
Then I might have fundamentally misunderstood the point of the mitigation. I thought it was addressing a approach done by a set of websites in the wild, which then couldn't use that approach for a limited duration of time, and hence didn't work. Not "generally", not "forever".1/2
2
That's not relevant to whether the privacy or security of the software has been improved. As I keep mentioning, Safe Browsing already exists and code doesn't need to be added to the browser to disrupt malicious sites by blacklisting them as malicious or otherwise harmful.
1
Safe Browsing already provides support for the enumerating badness approach, and in a low latency way. This change was developed and went through the usual release cycle. It wasn't released as a surprise. It wasn't disruptive. It even had tons of media coverage before shipping...
1