[liberationtech] The Google cookie that came out of nowhere

2015-04-28 Thread carlo von lynX
Juicy content from Ashkan Soltani further below.

On Sun, Apr 26, 2015 at 01:26:29PM -0700, Al Billings wrote:
 If you're the kind of person paranoid about safebrowing pings and similar, 
 yeah, you should pull the tinfoil hat tighter and block all things.

What I said in the original posting:
I was told it even lets Google have the cookie it uses to
identify you, so even if you use Tor, the five eyes immediately
know it is you. I didn't bother to check however.

I wonder if you read that part. Should that part be accurate, then
safebrowsing is among the top vectors for mass correlation of IP
numbers (or Tor circuits) to specific browsers and human beings.
The others being font and jquery includes, search engine utilization
and maybe a few +1 buttons here and there.

We discussed this topic back in 2014, May 12th to be exact.
safebrowsing could be offered in a distributed anonymous way,
instead it is being done in a way that it de-anonymizes people to
the fie eyes.

Some weeks later I accidently met Ashkan Soltani who told me he
already dissected the issue in pre-Snowden days. Looks like it 
hardly got traction - since noone knew the implications:

http://ashkansoltani.org/2012/02/25/cookies-from-nowhere/

http://blogs.wsj.com/digits/2012/02/28/the-google-cookie-that-seems-to-come-out-of-nowhere/

It is actually quite incredible that Google has been flying under
the radar of general interest since Ashkan's story came out, given
the immense implication for mass surveillance.

P.S. I don't think you have the necessary competence to tell *anyone*
about tinfoil hats and would like to ask you to contribute to this
mailing list less frequently and more thoughtfully. Thank you.

-- 
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, 
change to digest, or change password by emailing moderator at 
compa...@stanford.edu.


Re: [liberationtech] The Google cookie that came out of nowhere

2015-04-28 Thread Aymeric Vitte

+1 for the PS and the rest

I don't want to bother with this project again, but here [1] is 
explained part of what the browsers are doing, we can see that they send 
http/https request outside (example 2), but that's not enough of course, 
some of them like Chrome do inject by default some scripts in the page 
(example 3, this is not completely easy to detect, I noticed this with a 
good old site of ours http://www.viagri.fr which at that time had 0 
outside scripts in there, then I was surprised to see some outgoing 
requests and looking at the source code of the page the predictad script 
was there, injecting other stuff itself as well, it can be deactivated 
but you have to know it)


Regarding Tor, if think that the Tor Browser is blocking at least 
safebrowsing.


Regarding safebrowsing, it can make mistakes, as shown in [2] which 
prevented us to renew a SSL certificate, I questioned Google about this 
and never got a final answer.


Coming back to FF, as already asked it would be interesting to know 
precisely what it is sending outside and if there is an option to tell 
FF not to send anything (even ocsp queried with http sometimes, we don't 
care)


[1] 
https://www.kickstarter.com/projects/450023/ianonym-internet-privacy-everywhere-from-any-devic
[2] 
https://lists.torproject.org/pipermail/tor-talk/2015-February/036761.html


Le 28/04/2015 09:50, carlo von lynX a écrit :

Juicy content from Ashkan Soltani further below.

On Sun, Apr 26, 2015 at 01:26:29PM -0700, Al Billings wrote:

If you're the kind of person paranoid about safebrowing pings and similar, 
yeah, you should pull the tinfoil hat tighter and block all things.

What I said in the original posting:
 I was told it even lets Google have the cookie it uses to
 identify you, so even if you use Tor, the five eyes immediately
 know it is you. I didn't bother to check however.

I wonder if you read that part. Should that part be accurate, then
safebrowsing is among the top vectors for mass correlation of IP
numbers (or Tor circuits) to specific browsers and human beings.
The others being font and jquery includes, search engine utilization
and maybe a few +1 buttons here and there.

We discussed this topic back in 2014, May 12th to be exact.
safebrowsing could be offered in a distributed anonymous way,
instead it is being done in a way that it de-anonymizes people to
the fie eyes.

Some weeks later I accidently met Ashkan Soltani who told me he
already dissected the issue in pre-Snowden days. Looks like it
hardly got traction - since noone knew the implications:

 http://ashkansoltani.org/2012/02/25/cookies-from-nowhere/
 
http://blogs.wsj.com/digits/2012/02/28/the-google-cookie-that-seems-to-come-out-of-nowhere/

It is actually quite incredible that Google has been flying under
the radar of general interest since Ashkan's story came out, given
the immense implication for mass surveillance.

P.S. I don't think you have the necessary competence to tell *anyone*
about tinfoil hats and would like to ask you to contribute to this
mailing list less frequently and more thoughtfully. Thank you.



--
Check the 10 M passwords list: http://peersm.com/findmyass
Anti-spies and private torrents, dynamic blocklist: http://torrent-live.org
Peersm : http://www.peersm.com
torrent-live: https://github.com/Ayms/torrent-live
node-Tor : https://www.github.com/Ayms/node-Tor
GitHub : https://www.github.com/Ayms

--
Liberationtech is public  archives are searchable on Google. Violations of 
list guidelines will get you moderated: 
https://mailman.stanford.edu/mailman/listinfo/liberationtech. Unsubscribe, change 
to digest, or change password by emailing moderator at compa...@stanford.edu.