Browsers & browsing history: A team of researchers from Stanford and San Diego Universities have published a survey for Browser history re: visited.
The researchers with study τους, αποκαλύπτουν στο κοινό τέσσερις νέες και λειτουργικές attacks through the browsing history of the browsers.
Leak attacks affect all modern programs περιήγησης που δεν εμποδίζουν την αποθήκευση του ιστορικού περιήγησης. Με λίγα λόγια, ο Firefox, ο Chrome, ο Internet Explorer και ο Microsoft Edge είναι ευάλωτες applications while Tor Browser is not.
Most web browsers log the websites they visit by default. It is a feature used for convenience by the browser. When the users type in the address bar browsers remember the exact address and even suggest it in an autofill function.
Let's look at the attacks on your browsing history
The first attack discovered by the researchers uses the CSS Paint API to determine if a particular URL was visited by the user.
The second attack uses 3D CSS transforms, a technique που κυκλοφόρησε με την έκδοση CSS 3. Ένας εισβολέας συλλέγει 3D CSS και τα μετασχηματίζει σε άλλα CSS για να δημιουργήσει στοιχεία connections.
The third attack uses SVG images and the CSS fill rule. The attack uses an SVG image inside a login element and a "set of CSS fill rules".
The fourth and last attack uses Chrome's bytecode cache to determine whether a JavaScript source file has previously been loaded into the browser.
All four attacks have one audience: they must specify the URLs to control them. None of them can retrieve a user's entire browsing history.
How effective are these attacks? Researchers say one of these attacks can determine the 6000 address status per second.
Researchers have reported vulnerabilities to browser developers, but it will take months to get the necessary fixes.
____________________
- Windows 10 October updates 6 week in October
- Open Secure-K OS operating on USB
- Google responsible for the death of CIA agents