Hacker Newsnew | past | comments | ask | show | jobs | submit | englehardt's commentslogin

Hi, one of the authors here. We discuss this in the last section of the post. uBlock Origin uses lists to determine which requests to block. We tested the two largest, EasyList and EasyPrivacy, and both fail to block scripts from FullStory, Smartlook, and UserReplay.


I suggest uBO's medium mode, this blocks 3rd-party scripts by default.

[1] https://github.com/gorhill/uBlock/wiki/Blocking-mode:-medium...


thank you for suggestion in this unexpected place. i wish i knew of this uBO feature before!


I checked the hosts file I normally use (MVPS) and they don't seem to be in there either, unless they serve the scripts from a non-obvious domain.

Also fun fact, TurboTax uses SmartLook.


That doesn't seem very problematic to me. You are anyway trusting TurboTax with a bunch of sensitive information.


Yes, but you may not realize that SmartLook is also getting all that information.


How about NoScript, RequestPolicy, and Privoxy?

Were the blocking capabilities of any of these tested by your team?


Assuming it's used correctly ,noscript/requestpolicy should block these as they are 3rd party <script src>s


RequestPolicy appears to have been killed by FF57.


Gmail's image proxying actually won't help much with this style of tracking. In the paper we found email addresses (or hashes of them) leaking to third parties via a query string parameter in the request URL. So the proxied URL still contains your email address and the third parties can still learn you opened and read the email. As another commenter mentions, we found these requests to occur the moment you first open the email in the Gmail web interface. Since the request URL is unique to you, it can still be used to serve you targeted content. See: https://web.archive.org/web/20170922213846/https://support.l...

Actually I suspect image proxying will also interfere with request blockers like ABP or uBlock Origin, which may have otherwise blocked all requests to that third-party domain.


This is particularly annoying, because if they just cached the image immediately upon receiving the e-mail, there would be no privacy impact AND you would get to see the image. (Yes, it might still send your e-mail address to third parties, but someone who has your e-mail address is free to send it to anyone they want without your help; there is no way to stop that.)

I guess we didn't need further evidence that Google cares more about third party marketers than users' privacy.


We found that Apple Mail clients typically load remote resources by default, unless the message is spam. That content can't set or retrieve cookies, which is an improvement over other standalone clients.

I'd still recommend disabling remote content by default since the tracking identifiers (the hash of your email address, etc) are present in the image URL. That's enough to continue to track the read and serve targeted content. See: https://web.archive.org/web/20170922213846/https://support.l...


Hello, I'm one of the authors of this work.

The code and data for the study is available here: https://github.com/citp/email_tracking (measurement platform here: https://github.com/citp/OpenWPM).

We also just released a blog post that highlights the main results (and is a quicker read): https://freedom-to-tinker.com/2017/09/28/i-never-signed-up-f...


Thank you very much for doing this work! I have recommended that my employer, who makes a popular email client, read this and consider adding these sorts of features.


I prototyped this feature last year as an intern at Mozilla. I think the engineering done for containers can be exposed in a lot of cool ways to the user. I'd love for you to send in your ideas on the comment form [1]. One of the features we considered last summer was "site specific containers" [2], which would support your facebook example.

[1] https://docs.google.com/forms/d/1oQN14TUnqj-MDErp8MKxH_v7Ytt... [2] https://wiki.mozilla.org/Security/Contextual_Identity_Projec...


Is it possible to implement this feature via the extension API ? Exposing the low-levels, like choosing the cookie jar or intercepting calls to the local storage, would sprawl some really good privacy-enhancing extensions.

EDIT: Looks like there are already extensions doing that ! nice !


> EDIT: Looks like there are already extensions doing that ! nice !

Can you send a link?


On chrome it's "Tab Cookies": https://chrome.google.com/webstore/detail/tab-cookies/iahecg...

On firefox, "Self destructing cookies": https://addons.mozilla.org/en-US/firefox/addon/self-destruct...

You're welcome :)


There have been a couple plugins which try to address this question: Chameleon (https://github.com/ghostwords/chameleon), which is still in early stages, and FireGloves (https://fingerprint.pet-portal.eu/?menu=6), which was built by a research group (not sure it's still supported).

Also a great paper on this topic: http://research.microsoft.com/pubs/209989/tr1.pdf


Yes, we'll definitely do an analysis on this and write it up.


The Tor Browser folks have done some excellent work to reduce the fingerprintability of the browser. See "Specific Fingerprinting Defenses in the Tor Browser" here: https://www.torproject.org/projects/torbrowser/design/#finge....

For Firefox and Chrome there are canvas fingerprint blockers [1] and [2]. These are heuristic based, so you'll likely see a bit of false positives. uBlock Origin includes an option to prevent the leakage of local IP addresses [3].

[1] https://addons.mozilla.org/en-US/firefox/addon/canvasblocker...

[2]https://chrome.google.com/webstore/detail/canvasfingerprintb...

[3]https://github.com/gorhill/uBlock/wiki/Prevent-WebRTC-from-l...


Yes, no sound is recorded. Access to the user's mic isn't possible without a permission. If there are sections of the website or paper that seem to imply that, let me know and we'll clarify.


It seems strange that access to the audio stack isn't also behind the permission.


It does, and also as someone who has never heard of AudioContext before, I can't fathom why it would be necessary for a web application to generate an audio data stream that isn't output to speakers _AND_ _THEN_ analyze the result.

What is the typical use case for AudioContext?

The capabilities of AudioContext used in audio fingerprinting seem like they're beyond what is really necessary?


AudioContext is actually pretty cool. As far as I know, only Firefox supports it at the moment. But it allows you to work with audio streams in raw byteform, which means you can do advanced audio processing in client side javascript.


Presumably, an application would need to enumerate audio capabilities before even offering the option.


The front page [1] doesn't say either way, and I wondered the same thing when I read it. A few words or a link to an explanation would be helpful.

[1] https://webtransparency.cs.princeton.edu/webcensus/index.htm...


Thanks, I've added a clarification.


Other co-author here. Unfortunately there are good performance reasons for allowing WebRTC to access the local IP, see the lengthy discussion here: https://bugzilla.mozilla.org/show_bug.cgi?id=959893. One use case is allowing two peers behind the same NAT to communicate directly without leaving the local network.

The working group recommendation that we linked in the paper (https://datatracker.ietf.org/doc/draft-ietf-rtcweb-ip-handli...) addresses some of the concerns that arise from that (namely the concern that a user behind a VPN or proxy will have their real, public address exposed), but still recommends that a single private IP address be returned by default and without user permission.

However that's still quite identifying for some network configurations, e.g. a network which assigns non-RFC1918 IPs to users behind a NAT. Seems to me that putting access to the local IP address behind a permission would both remove the tracking risk and still allow the performance gains after the user grants permission.


Thanks for the response! If you're interested and it would be useful for your research, I have some really, really interesting privacy findings regarding Service Workers I'd be happy to share. I'm strongly in favor of an enhanced Open Web, but I'm not comfortable with the opaque nature in which tracking/privacy can be likewise enhanced with little user interaction or notification. Keep up the good work.


Feel free to email us at the addresses listed on the bottom of the linked site.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: