-
Notifications
You must be signed in to change notification settings - Fork 523
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
FPI & Cache Occupancy Channel FP'ing [Tor 28621] #547
Comments
page 11:
so no, disabling disk or memory cache does not mitigate it They're measuring rendering "time" (not really but let's go with that for simplicity) of sites loaded in other tabs/windows or even other browsers and comparing it against a pre-generated "table" of rendering times for certain sites. I don't see how FPI would have any effect on that at all. It's definitely interesting but not very practical for a general purpose, wide-range attack. Different hardware will produce very different "times" and even using something simple like blocking all 3rd-party request will have a major impact on rendering times. So basically they can't just use one table to attack normies and power-users alike. |
ps: blocking workers will almost certainly make this attack impossible |
workers cannot be blocked (unless via an extension?). Do you mean service workers? |
|
so do you mean workers, or service workers (yup, I know SW's requires workers)? The description from uM says "web workers" |
page 5:
|
FFS! duckduckgo -> mozilla workers https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API/Using_web_workers they call both of these things "web workers" so uM is totally correct in its description |
thanks btw for linking all these interesting research papers here though, much appreciated 💋 |
uMatrix uses the worker-src CSP to block
|
That's what I assumed (and probably knew), but I wanted you to be more EXPLICIT in your definition, which is why I asked, TWICE. Thanks for finally getting around to it 💋 PS: Don't assume anything (from your now edited comment) - I do things for a reason, mostly .. at night, mostly |
We have these: // privacy.reduceTimerPrecision Table 5 has a Firefox 59 with time resolution of 2.0 ms, that corresponds to a See: #448 (comment) |
update: email from Tom Ritter
Just follow the relevant Tor ticket 28621 - I don't think there is a corresponding bugzilla |
Paper: https://arxiv.org/abs/1811.07153
Article: https://www.theregister.co.uk/2018/11/21/unmasking_browsers_side_channels/
@tomrittervg : does FPI mitigate this, or what about disabling cache(s) (disk, memory)?
Or is this something that can only be blocked by timing, eg FuzzyFox down the track? Or is this a bit old and we're already OK?Asking for a friend 😁edit: ok, spose I better read it first
The text was updated successfully, but these errors were encountered: