Browser Privacy Leaks

The cluster centers on privacy risks in browsers and web services, where mechanisms like resource preloading, IP addresses, fingerprints, and timing attacks enable tracking of visited websites without user consent.

πŸ“‰ Falling 0.4x Security
4,170
Comments
20
Years Active
5
Top Authors
#221
Topic ID

Activity Over Time

2007
10
2008
23
2009
45
2010
87
2011
124
2012
151
2013
211
2014
171
2015
225
2016
230
2017
267
2018
309
2019
400
2020
410
2021
388
2022
378
2023
296
2024
173
2025
262
2026
10

Keywords

LOT SOPA HSTS tinker.com DNS NAT FB HN www.scss HTTPS ip ip address privacy visited website browser address sites jquery information

Sample Comments

tinus_hn β€’ Jan 25, 2023 β€’ View on HN

I don’t see how this service checks if the website is supposed to be using it. So it seems any website can get all this information and use it to track users.

Qantourisc β€’ Jul 15, 2015 β€’ View on HN

The information "hey I have an IP and I'm using this browser, and I have a browser at this time" is going to be send A LOT when using the browser for what it's made for. The problems come later when sending every URL to another party (safe browsing). Also from google "Privacy: API users exchange data with the server using hashed URLs, so the server never knows the actual URLs queried by the clients." So it's possibly safe ?

bo1024 β€’ Jun 2, 2018 β€’ View on HN

Yes, though IP address isn't too much info. You can mitigate it with a VPN or by not loading external resources by default.

throwawayadvsec β€’ Jun 8, 2023 β€’ View on HN

wait so you can detect if any of your visitors visited any link before? isn't that a huge privacy risk?

papln β€’ Jul 29, 2019 β€’ View on HN

Yes. Browser have been making partial attempts to resist this, but it's an intractable problem in general -- You can't interact with a website without leaking information about yourself. Using a trusted proxy that serves many people can help.

thatcat β€’ Jan 25, 2020 β€’ View on HN

Not a joke, panopticlick by eff does this too and explains how it works.

kevin_thibedeau β€’ Dec 30, 2018 β€’ View on HN

It doesn't prevent all tracking. You still leak uniquely identifying info via cookies, headers, and IP.

icebraining β€’ Feb 24, 2014 β€’ View on HN

It might have privacy issues, though. Say you copy the HN logo to your server, and then serve it with an hash. You can then tell if the person has visited HN by seeing if their browser asks for the logo.

kenmacd β€’ Oct 29, 2021 β€’ View on HN

The IP you connect to could host 1000 sites. Leaking which one you're actually accessing could be important.

a1369209993 β€’ Jul 25, 2020 β€’ View on HN

Thinking more adversarially, doesn't this provide an easy way to track anyone who visits a target website?