Members
  • Total Members: 14176
  • Latest: toxxxa
Stats
  • Total Posts: 42945
  • Total Topics: 16144
  • Online Today: 4434
  • Online Ever: 51419
  • (01. January 2010., 10:27:49)









Post reply

Name:
Email:
Subject:
Message icon:

Verification:
Type the letters shown in the picture
Listen to the letters / Request another image

Type the letters shown in the picture:
Second Anti-Bot trap, type or simply copy-paste below (only the red letters):www.scforum.info:

shortcuts: hit alt+s to submit/post or alt+p to preview


Topic Summary

Posted by: Samker
« on: 07. August 2010., 07:32:04 »



All the major web browsers have a privacy mode that's supposed to cover a user's tracks after he or she finishes an Internet session, but a trio of researchers have found those modes fail to purge all traces of a Net surfer's activities.

For instance, Mozilla Firefox has something called a "custom handler protocol" that creates URLs that hang around even after a user leaves privacy mode.

Secure certificates can also be used to thwart the purpose of privacy modes. Firefox, Internet Explorer and Safari  all support the use of SSL client certificates. A website, through Javascript, can instruct a browser to generate an SSL client public/private key pair. That key pair is retained by the browser even after the privacy session ends. In addition, if a site uses a self-signed certificate, IE and Safari will store it locally in a Microsoft certificate vault and it stays there when the privacy session ends. So anyone who knows where to look for it can find it and glimpse into a user's Internet travels.

Internet Explorer also blows a user's cover in privacy mode when it initiates SMB requests with a web server. "Even if the user is behind a proxy, clears the browser state, and uses InPrivate, SMB connections identify the user to the remote site," the researchers--Gaurav Aggarwal and Dan Boneh, of Stanford Univeristy, and Colin Jackson, of Carnegie Melon University--wrote in a paper scheduled to be presented next week at the Usenix Security Symposium in Washington, D.C.: http://crypto.stanford.edu/%7Edabo/pubs/abstracts/privatebrowsing.html

However, the trio found that the SMB flaw may be negligible because many ISPs filter SMB port 445.

They also raised a red flag about the potential for browser add-ons to undermine privacy modes. "Browser add-ons (extensions and plug-ins) pose a privacy risk to private browsing because they can persist state to disk about a user's behavior in private mode," the researchers wrote.

"The developers of these add-ons may not have considered private browsing mode while designing their software and their source code is not subject to the same rigorous scrutiny that browsers are subjected to," they added.

The researchers also discovered a way for webmasters to determine if a user was accessing their site in privacy mode. They acknowledged, however, that the technique exploited an attack that had already been fixed in Safari, was soon to be shut down in Firefox and was expected to be closed up soon in IE and Chrome.

The bottom line from the trio's travails: don't do anything in privacy mode that you wouldn't do with the boss looking over your shoulder.
;)

(PCW)
Enter your email address to receive daily email with 'SCforum.info - Samker's Computer Forum' newest content:

Terms of Use | Privacy Policy | Advertising