I think I didn't explain it clearly.

We would use the field names in our analysis to nominate a set of fields that are considered to contain sensitive data. The browser would acquire a list of these fields through an update process, or ship with it. Through normal usage the form history list will get filled out. When a form history field is added that matches the list, the value of that field is added to the filter to flag the data as sensitive. When a user enters data on a site that matches the "sensitive" filter the user would be notified that there is an untrustworthy site asking for potentially sensitive data.

Make more sense?

On 12-03-22 1:46 PM, Adam Barth wrote:

It seems like this wouldn't help in the case when your connection has actually been compromised by an attacker because the attacker would just avoid these sensitive names.

Adam

On Mar 22, 2012 1:27 PM, "Yvan Boily" <[email protected] <mailto:[email protected]>> wrote:

    Done.

    I agree that the "sensitive" field list could be challenging to
    produce.  As for the "popular" site database, I would defer to other
    existing lists of top sites (Alexa top site list comes to mind).

    As for building the survey list we could probably use an add-on to
    collect sanitized & anonymized data.  Grabbing a list of the field
    names
    that have matching values, and tracking a hit count for them would
    allow
    us to see which fields are likely to be related; if we can gather just
    the variable names and match count for a large set of users we
    should be
    able to build a reasonable profile of what might constitute a
    "sensitive" field.


    On 12-03-22 1:14 PM, Sid Stamm wrote:
    > Hey Yvan,
    >
    > Can I suggest bringing this up in dev.security?  I think you'll
    get more
    > feedback there...
    >
    > My take is that we could leverage this kind of info, but the set of
    > "sensitive" fields will change over time and I'm not too fond of
    > maintaining a database of (1) popular sites and (2) parameters
    that are
    > "sensitive" fields on those sites.
    >
    > -Sid
    >
    > On 03/22/2012 01:12 PM, Yvan Boily wrote:
    >> Shane and I were having a quick chat about privacy and security
    UX and
    >> we ended up chatting about an interesting concept to improve
    the user
    >> experience when a 'bad' certificate is in use (expired,
    self-issued, etc)
    >>
    >> Firefox already maintains a database of auto-complete fields,
    and over
    >> time a user will have a set of data that could potentially be
    used to
    >> warn the user when they are sending 'sensitive' fields over
    insecure
    >> channels.
    >>
    >> By performing a survey of large usage payment sites we could
    identify
    >> common parameter names that are saved on major sites, then flag
    fields
    >> such as name, address, credit card number,etc, related fields
    as being
    >> "personal" data.
    >>
    >> If we did this, would it be feasible to analyze user input into DOM
    >> elements and raise warnings if personal data is entered into
    documents
    >> loaded from "bad" sites?
    >>
    >> I haven't spent too much time thinking about it, but fields
    identified
    >> as personal data from the survey could be fed into a bloom
    filter, and
    >> then user input on "bad" sites could be checked against this
    filter to
    >> determine if there is sensitive data in it.  This could help
    users to
    >> better understand the context of our somewhat unfriendly bad
    certificate
    >> error messages.
    >>
    >> Thoughts?
    >>
    _______________________________________________
    dev-security mailing list
    [email protected] <mailto:[email protected]>
    https://lists.mozilla.org/listinfo/dev-security



_______________________________________________
dev-security mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security

Reply via email to