-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Risk of re-identification attacks #4
Comments
I don't think the 2010 migration provides a significant defense even for fingerprinting since detecting Visited Links via Redraw Timing does not require user interaction although does maybe slow an attack down. Seems your concern is with fingerprinting and the fix for that would be delete visited link state same as localStorage or provide the option to opt-out of the visited links feature. |
Agreed! The point was to avoid relaxing the existing mitigations since partitioning visited links by site does not solve all privacy issues. Re-identification via efficient visited link detection is undoubtedly valuable to an attacker. |
Seems this wont fix attacker controlled CSS injection so links clicked in one email will still be detectable in a different email. |
@arturjanc, Clearing browsing history via "clear site data" sounds reasonable. At that point, I would probably expect to remove all visited entries having the top-level site or the frame origin keys same-site with the current origin. I also agree with @NDevTK that privacy-concerned users would appreciate a global switch to turn off the visited links feature completely. |
This can be done by disabling browser history, or if on Firefox, by setting the option Chromium should also add a way to do it. |
We should probably note that equally leaks a bit of information to web pages that makes the user fingerprintable also. Privacy sensitive UAs probably would be better just expiring link history regularly.
|
I dont think its equal for where this fix does not apply such as gmail its leaking what link you clicked not just that you have a feature disabled. Also the screenshare threat of having your browser history leaked is gone. |
I've been discussing the privacy implications of this proposal with Giorgio Maone during the xs-leaks summit in London last week.
The document lists Deprecating the 2010 CSS Mitigations as future work, assuming it's safe for a site to know what links the user has visited in a partitioned setting. Although a malicious site could not extract the user's global navigation history, it could still exploit the local
:visited
state to perform a re-identification attack.Suppose a user is lured into visiting evil.example, with a unique token in the URL. The token can now be used to permanently identify subsequent visits of the same user to evil.exameple, e.g., by probing the
:visited
pseudo-class viawindow.getComputedStyle
. The re-identification attack would work even if the user has cleared their cookies and local storage.If the proposal is adopted, we recommend keeping the 2010 mitigations in place.
The text was updated successfully, but these errors were encountered: