Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @s_englehardt
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @s_englehardt
-
Steven Englehardt proslijedio/la je Tweet
"Early data collected by Digiday suggests that the changes may already be causing people to click on more ads."https://www.theverge.com/tldr/2020/1/23/21078343/google-ad-desktop-design-change-favicon-icon-ftc-guidelines …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
In summary: the introducing of cross-site state based on browsing history is dangerous. The paper mentions that a number of these issues have been addressed by Safari, but that there are fundamental limitations.pic.twitter.com/w9y76IPNWI
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Finally, the attacker can use a bunch of dummy origins to encode a cross-site identifier within the ITP list (similar to HSTS supercookies). ITP doesn't classify origins loaded in documents open for less than 5 seconds, so attackers can read the encoded ID without destroying it.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An attacker can use this same approach to place a victim domain on the ITP list, potentially leading to denial of service. e.g., get a competitor's authentication origin classified by ITP, so its cookies are stripped and future login attempts fail.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
More troubling: the classification status of a resource may depend on a user's actions *within* a site. E.g., health.example may only load medical-condition.example if I have a certain medical condition. A similar attack is possible on search query landing pages.pic.twitter.com/CGAVHT5AO8
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
As a practical example. Let's say the user visits dating.example, which embeds dating-cdn.example. An attacker can load dating-cdn.example on two attack sites. If they detect classification after the second visit, they learn that the user has visited dating.example.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
...if the attacker finds that the subresource in question is classified as a tracker prior to loading it on three attack websites, then they know the user has visited a site that embeds the subresource This is true even for subresources embedded on a single website.pic.twitter.com/HpcL0VMnSo
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Does this mean that only "prevalent" domains are vulnerable? No. The authors find that ITP consistently classifies domains as prevalent after they load on 3 sites. An attacker can load the non-prevalent domain across multiple sites and check its classification...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An attacker can use these side channels to determine whether specific hostnames are classified by ITP, thus implying that the user visits sites that embed those hosts. These hostnames can reveal incredibly sensitive information (e.g., phncdn[.]com, which is Pornhub's CDN).
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Attackers can use side-channels to determine whether resources are classified by ITP. A clever one is to send a referrer header over the size limit of most webservers and check whether the request was successful (ITP trims referrer headers for trackers). There are many others.pic.twitter.com/SVw9H4HEk5
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Excellent paper by
@arturjanc et al. on the risks of on-device tracker classification. Specifically, they discuss how Safari's ITP can be abused to leak browsing history, leak search history, and perform denial of service attacks: https://arxiv.org/ftp/arxiv/papers/2001/2001.07421.pdf … [thread]Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Steven Englehardt proslijedio/la je Tweet
Please welcome the new W3C Privacy Community Group, chaired by people from Apple, Mozilla, and Microsoft. The web has a bright future! https://privacycg.github.io
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
...and that's the metric we should use to determine whether a browser is working to protect user privacy. If my browser locally infers my sexuality from my site visits and reveals that to advertisers, that's certainly not a browser working to protect me.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
In some sense, this is an opportunity for a clean slate. We can decide what functionality to re-enable (e.g., cross-site logins). But what's left to be seen is how much of the new functionality added back in by browsers will be focused on re-enabling behavioral profiling...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'm excited that Chrome has signaled a desire to block third-party cookies because it means all browsers will share the breakage cost of removing a very common tracking vector. A vector that's so intimately connected to things users care about that it's very difficult to block.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The profiling and targeting of users based on their browsing history is privacy invasive. Cookies are just a means to an end. Blocking cookies alone doesn't mean a browser is protecting privacy.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
There are a lot of reasons to dislike cookies: 1. They aren't origin-bound like basically all other storage. 2. The only way to use them securely is to add prefixes and tokens. These are largely unused (https://tools.ietf.org/html/draft-west-http-state-tokens-00#page-4 …). But these don't make cookies privacy invasive...
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Third-party cookies aren't inherently privacy invasive. It was a mistake to equate blocking cookies with protecting privacy. (I'm guilty of this myself) [thread]
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
@blassey@justinschuh Are you able to confirm what anti-fingerprinting work is in scope here?Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The announcement also includes a timeline for anti-fingerprinting work. End of year sounds too aggressive for their Privacy Budget proposal (https://github.com/bslassey/privacy-budget …), so perhaps this is referring to other measures?pic.twitter.com/aCyVlDbOrf
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.