I've forwarded these questions on to the working group:
http://lists.w3.org/Archives/Public/public-web-perf/2011May/0102.html

In the meantime, we'll hold off on landing anything until we have
satisfactory answers.

-Tony

On Fri, May 20, 2011 at 6:51 PM, Maciej Stachowiak <m...@apple.com> wrote:
>
> On May 20, 2011, at 10:10 AM, Tony Gentilcore wrote:
>
>>> Presumably the embedding application would need to require explicit user 
>>> consent to enable the feature.
>>
>> My conclusion was different. Given that the timing based privacy
>> attacks are demonstrable without the interface, I thought it
>> reasonable to enable-by-default with a hidden pref to disable. But
>> this is based on the assumption that we aren't actually exposing any
>> new private information. Am I missing an exploit here?
>
> I understand that we have to keep a balance, and statistical fingerprinting 
> is already dismayingly effective without any new features. However, 
> "enable[d]-by-default with a hidden pref to disable" sounds like an extremely 
> weak approach to protecting user privacy.
>
> Is it possible to find experts on the topic of statistical fingerprinting, as 
> well as security experts in general, who could review this API? Things I'd 
> really like to know are:
>
> - Does this feature, as designed, increase the effectiveness of user 
> fingerprinting, assuming the user is running something like private browsing 
> or incognito mode, or is regularly deleting site data? The relevant question 
> here is marginal increase in effectiveness - are things worse with this 
> feature than without?
>
> - Presumably some known statistical fingerprinting techniques can be 
> mitigated, if not always than at least in private browsing mode. If that was 
> done, then would this timing feature provide an additional fingerprinting 
> vector?
>
> - Could this feature directly reveal otherwise hard-to-guess information 
> about users?
>
> - Can this feature be used to aid timing-based security attacks?
>
> I would really like to see this kind of review done ahead of time and 
> delivered to the Working Group. My worry here is that the feature may have 
> fatal flaws as currently designed, or perhaps even in the basic concept of 
> its functionality. If that's the case, then we'd certainly want to find out 
> before we get locked into it. Perhaps some of the privacy risks can even be 
> mitigated, such as by returning fake or random data in private browsing mode. 
> I can ask some of Apple's security experts to review with a mind to these 
> questions, but I'm wondering if there are other independent experts we could 
> ask.
>
> My preference would be to tread very carefully around anything that could be 
> perceived as a privacy risk.
>
> Regards,
> Maciej
>
>
_______________________________________________
webkit-dev mailing list
webkit-dev@lists.webkit.org
http://lists.webkit.org/mailman/listinfo.cgi/webkit-dev

Reply via email to