Browser 'privacy modes' not so private after all
PC World - All the major web browsers have a privacy mode that's supposed to cover a user's tracks after he or she finishes an Internet session, but a trio of researchers have found those modes fail to purge all traces of a Net surfer's activities.
For instance, Mozilla Firefox has something called a "custom handler protocol" that creates URLs that hang around even after a user leaves privacy mode.
Internet Explorer also blows a user's cover in privacy mode when it initiates SMB requests with a Web server. "Even if the user is behind a proxy, clears the browser state, and uses InPrivate, SMB connections identify the user to the remote site," the researchers--Gaurav Aggarwal and Dan Boneh, of Stanford University, and Colin Jackson, of Carnegie Melon University--wrote in a paper scheduled to be presented next week at the Usenix Security Symposium in Washington, D.C.
However, the trio found that the SMB flaw may be negligible because many ISPs filter SMB port 445.
They also raised a red flag about the potential for browser add-ons to undermine privacy modes. "Browser add-ons (extensions and plug-ins) pose a privacy risk to private browsing because they can persist state to disk about a user's behavior in private mode," the researchers wrote.
"The developers of these add-ons may not have considered private browsing mode while designing their software and their source code is not subject to the same rigorous scrutiny that browsers are subjected to," they added.
The researchers also discovered a way for Webmasters to determine if a user was accessing their site in privacy mode. They acknowledged, however, that the technique exploited an attack that had already been fixed in Safari, was soon to be shut down in Firefox and was expected to be closed up soon in IE and Chrome.
The bottom line from the trio's travails: don't do anything in privacy mode that you wouldn't do with the boss looking over your shoulder.
- Social Media Education: The New Edge for Success Failure to train for social media will cost your business money. A recent report showed how digitally prepared companies can unlock up to...
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Clearing the Network Hurdle to Cloud Deployment Although enthusiasm is high among IT pros for cloud services, an IDG Research Quick Poll survey found that, in fact, the cloud is...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Internet White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!