The open Cookie jar...

Discussion in 'privacy problems' started by deBoetie, Aug 17, 2018.

  1. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    Researchers at KU Leuven are reporting mechanisms whereby cookies can be used to bypass browser and extension based protections from cookie tracking by 3rd parties.

    https://wholeftopenthecookiejar.eu/static/tpc-paper.pdf

    Companion website:

    https://wholeftopenthecookiejar.eu/

    It seems like all popular browsers and extensions are vulnerable to varying degrees, including TBB, ABP, UBO etc. At least Gorhill/UBO has addressed some of the issues identified, but this looks to be an important thing to monitor/have mitigations for, for people here.

    I do not know, and would be interested to discuss, the extent to which controls such as site containers in FF help.

    Various commentaries:

    https://www.schneier.com/
    https://www.theregister.co.uk/2018/08/17/usenix_cookies/
    https://www.bleepingcomputer.com/ne...browser-tracking-protections-and-ad-blockers/
    https://www.tomsguide.com/us/ad-tracking-block-fail,news-27819.html
    https://boingboing.net/2018/08/16/who-left-open-the-cookie-jar.html
     
  2. reasonablePrivacy

    reasonablePrivacy Registered Member

    Joined:
    Oct 7, 2017
    Posts:
    2,010
    Location:
    Member state of European Union
    So what is a temporary solution? Using multiple browsers at once, I guess. Each one to login to different website/webapp...
     
  3. mirimir

    mirimir Registered Member

    Joined:
    Oct 1, 2011
    Posts:
    9,252
    Hey, compartmentalization :)

    Just using multiple browsers is iffy. Much better is using multiple VMs.

    And better yet, multiple physical machines. If I were seriously into that, I'd probably go with a bunch of microcomputers on a KVM switch.
     
  4. Reality

    Reality Registered Member

    Joined:
    Aug 25, 2013
    Posts:
    1,198
    Haven't read the pdf yet but once again, things like this is precisely why I advocate being careful what you put online at all. These issues come up with regular monotony.
     
  5. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    As far as temporary solutions are concerned, I think having controls in the router completely independent of clients and browsers is a start, and I also believe (not sure, haven't tested), is that the FF multi-account-containers will assist is limiting contagion, but I'm not sure about this. Also, a fairly fanatical compartmentalisation approach including opsec in terms of browser use - a pain and always prone to slip-ups.

    I'm also using multiple profiles created with firejail (rather than browser-based profile management), because that allows you to have different policies and file locations enforced by the firejail sandbox.

    I don't think there are long-term solutions as far as browsers are concerned because they have become too complex, are glitzy front-ends to a controlling mainframe that gets to execute what it likes on your machine (for "functionality" read addictive eye-ball grabbing), and the business models of the browser developers is actively hostile to privacy. Browsers were "sold" on the basis that code run on them would be completely isolated from your real computer, and from each session. That's a lie.

    I believe the only privacy respecting paradigm will be use of structured messaging according to an agreed domain schema (a bit like EDI), encrypted in transit, and completely parsed, processed and rendered by client software under your control, with good sandboxing/decoupling between processing and rendering (this is impossible with browsers because html is designed with a rendering expectation and has numerous extensions which can be implemented such as webrtc). I think that dark marketplaces may be the first to develop such schemes, mainly to protect the marketplace owners.

    Of course, that would require a different attitude to latency, although one I would greatly value - because I loved the days when you submitted batch jobs that the computer got on with while enjoying my life elsewhere! The issue is that this way of working, while better for most people most of the time, is inimical to the desire of the free commercial services who wish to grab your eyeballs.
     
  6. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,199
    There is an interesting discussion (with @gorhill participarting) on ghacks-user.js with several good links.
     
  7. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    @summerheat - thanks, something to absorb in those discussions! That responsiveness and transparency is something that's always been good about uBO.
     
  8. Gandalf_The_Grey

    Gandalf_The_Grey Registered Member

    Joined:
    Jan 31, 2012
    Posts:
    1,188
    Location:
    The Netherlands
  9. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Haven't read the report yet, but I assume that Ghostery and uBlock are vulnerable because the problem lies in the browser itself, right? And the funny thing is that this report was sponsored by Facebook, since when are they so concerned about this topic LOL.

    Yes exactly, I do use ad and tracking blockers but I don't have any illusions about companies not being able to track me. The problem lies in the whole browser architecture.
     
  10. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
  11. SouthPark

    SouthPark Registered Member

    Joined:
    Jun 13, 2012
    Posts:
    737
    Location:
    South Park, CO
  12. Azure Phoenix

    Azure Phoenix Registered Member

    Joined:
    Nov 22, 2014
    Posts:
    1,560
    @avatar
    Is Adguard for Windows free of the issues presented?
     
  13. summerheat

    summerheat Registered Member

    Joined:
    May 16, 2015
    Posts:
    2,199
    Actually, Temporary Containers is the way to go as it opens every site in its own temporary container (and not only specific sites). I use it alongside First-Party Isolation. All tests on that site failed for me. :thumb:
     
  14. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    @summerheat - thanks, I've been evaluating temporary containers too, can't remember where I was with that!
     
  15. lolnothankyou

    lolnothankyou Registered Member

    Joined:
    Jul 29, 2018
    Posts:
    61
    Location:
    DisableLocation
  16. gorhill

    gorhill Guest

  17. guest

    guest Guest

    Firefox 65: New Cookie Jar Policy to block tracking
    September 23, 2018
    https://www.ghacks.net/2018/09/23/firefox-65-new-cookie-jar-policy-to-block-tracking/
     
  18. Brummelchen

    Brummelchen Registered Member

    Joined:
    Jan 3, 2009
    Posts:
    5,920
    blocking tracking cookies is already present in firefox 63beta, 64 nightly got an additional part, its usable.
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.