Steven Englehardt

@s_englehardt

Privacy Engineer at Mozilla. CS PhD from Princeton. Working to make the web more private. [Comments are mine, not my employers]

Mountain View, CA
Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @s_englehardt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @s_englehardt

  1. proslijedio/la je Tweet
    24. sij

    "Early data collected by Digiday suggests that the changes may already be causing people to click on more ads."

    Poništi
  2. 22. sij

    In summary: the introducing of cross-site state based on browsing history is dangerous. The paper mentions that a number of these issues have been addressed by Safari, but that there are fundamental limitations.

    Prikaži ovu nit
    Poništi
  3. 22. sij

    Finally, the attacker can use a bunch of dummy origins to encode a cross-site identifier within the ITP list (similar to HSTS supercookies). ITP doesn't classify origins loaded in documents open for less than 5 seconds, so attackers can read the encoded ID without destroying it.

    Prikaži ovu nit
    Poništi
  4. 22. sij

    An attacker can use this same approach to place a victim domain on the ITP list, potentially leading to denial of service. e.g., get a competitor's authentication origin classified by ITP, so its cookies are stripped and future login attempts fail.

    Prikaži ovu nit
    Poništi
  5. 22. sij

    More troubling: the classification status of a resource may depend on a user's actions *within* a site. E.g., health.example may only load medical-condition.example if I have a certain medical condition. A similar attack is possible on search query landing pages.

    Prikaži ovu nit
    Poništi
  6. 22. sij

    As a practical example. Let's say the user visits dating.example, which embeds dating-cdn.example. An attacker can load dating-cdn.example on two attack sites. If they detect classification after the second visit, they learn that the user has visited dating.example.

    Prikaži ovu nit
    Poništi
  7. 22. sij

    ...if the attacker finds that the subresource in question is classified as a tracker prior to loading it on three attack websites, then they know the user has visited a site that embeds the subresource This is true even for subresources embedded on a single website.

    Prikaži ovu nit
    Poništi
  8. 22. sij

    Does this mean that only "prevalent" domains are vulnerable? No. The authors find that ITP consistently classifies domains as prevalent after they load on 3 sites. An attacker can load the non-prevalent domain across multiple sites and check its classification...

    Prikaži ovu nit
    Poništi
  9. 22. sij

    An attacker can use these side channels to determine whether specific hostnames are classified by ITP, thus implying that the user visits sites that embed those hosts. These hostnames can reveal incredibly sensitive information (e.g., phncdn[.]com, which is Pornhub's CDN).

    Prikaži ovu nit
    Poništi
  10. 22. sij

    Attackers can use side-channels to determine whether resources are classified by ITP. A clever one is to send a referrer header over the size limit of most webservers and check whether the request was successful (ITP trims referrer headers for trackers). There are many others.

    Prikaži ovu nit
    Poništi
  11. 22. sij

    Excellent paper by et al. on the risks of on-device tracker classification. Specifically, they discuss how Safari's ITP can be abused to leak browsing history, leak search history, and perform denial of service attacks: [thread]

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    17. sij

    Please welcome the new W3C Privacy Community Group, chaired by people from Apple, Mozilla, and Microsoft. The web has a bright future!

    Poništi
  13. 16. sij

    ...and that's the metric we should use to determine whether a browser is working to protect user privacy. If my browser locally infers my sexuality from my site visits and reveals that to advertisers, that's certainly not a browser working to protect me.

    Prikaži ovu nit
    Poništi
  14. 16. sij

    In some sense, this is an opportunity for a clean slate. We can decide what functionality to re-enable (e.g., cross-site logins). But what's left to be seen is how much of the new functionality added back in by browsers will be focused on re-enabling behavioral profiling...

    Prikaži ovu nit
    Poništi
  15. 16. sij

    I'm excited that Chrome has signaled a desire to block third-party cookies because it means all browsers will share the breakage cost of removing a very common tracking vector. A vector that's so intimately connected to things users care about that it's very difficult to block.

    Prikaži ovu nit
    Poništi
  16. 16. sij

    The profiling and targeting of users based on their browsing history is privacy invasive. Cookies are just a means to an end. Blocking cookies alone doesn't mean a browser is protecting privacy.

    Prikaži ovu nit
    Poništi
  17. 16. sij

    There are a lot of reasons to dislike cookies: 1. They aren't origin-bound like basically all other storage. 2. The only way to use them securely is to add prefixes and tokens. These are largely unused (). But these don't make cookies privacy invasive...

    Prikaži ovu nit
    Poništi
  18. 16. sij

    Third-party cookies aren't inherently privacy invasive. It was a mistake to equate blocking cookies with protecting privacy. (I'm guilty of this myself) [thread]

    Prikaži ovu nit
    Poništi
  19. 14. sij

    Are you able to confirm what anti-fingerprinting work is in scope here?

    Prikaži ovu nit
    Poništi
  20. 14. sij

    The announcement also includes a timeline for anti-fingerprinting work. End of year sounds too aggressive for their Privacy Budget proposal (), so perhaps this is referring to other measures?

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·