Browsers & browsing history: A team of researchers from Stanford and San Diego Universities have published a survey for Browser history re: visited.
The researchers, with their study, reveal to the public four new and functional attacks through browsers' browsing history.
Leak attacks affect all modern browsers that do not prevent your browsing history from being saved. In short, Firefox, Chrome, Internet Explorer and Microsoft Edge are vulnerable applications while Tor Browser is not.
Most web browsers log the websites they visit by default. It is a feature that usesfor convenience from the browser. When users type in the address bar, browsers remember the exact address address and even recommend it in an autofill mode.
Let's look at the attacks on your browsing history
The first attack that the researchers discovered uses the CSS Paint API to determine whether a particular URL was visited by the user.
The second attack uses 3D CSS transformations, a technique released with CSS 3. An attacker collects 3D CSS and transforms them into other CSS to create login information.
The third attack uses pictures SVG and the CSS fill rule. The attack uses an SVG image inside a link element and a “string of CSS padding rules”.
The fourth and final attack uses the temporary μνήμη Chrome bytecode to determine if a JavaScript source file was previously loaded in the browser.
All four attacks have one audience: they must specify the URLs to control them. None of them can retrieve a user's entire browsing history.
How effective are these attacks? Researchers say one of these attacks can determine the 6000 address status per second.
Researchers have reported vulnerabilities to browser developers, but it will take months to get the necessary fixes.
____________________
- Windows 10 October updates 6 week in October
- Open Secure-K OS operating on USB
- Google responsible for the death of CIA agents