-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Define our threat model #12
Comments
Other capabilities:
Other goals:
It might be useful to group up fine-grained capabilities into some smaller set of actor personas, since sometimes it is the combination of capabilities that determine an attacker's options. For example, if an attacker has significant 3P presence and can run javascript, they could frequently transfer identities without adding a navigational redirect or a bounce (by decorating via javascript on the source and reading via javascript on the destination, no extra hops needed). And I'm not sure if associating opaque user IDs is very useful for tracking purposes if an actor can't receive ID-annotated resource requests on page visits. |
I'm hoping to help write a threat model with a few different actors and capabilities to at least get the ball rolling in the spec. I think I have my head around list based approaches, however I'm a little confused while going through the mitigations in place on Safari. In particular, the last two paragraphs as written have me scratching my head a bit.
The goal seems to be to restrict storage of the destination of a navigational tracker, which makes sense and is in line with other defenses. But why is there a carve out for cookies in the first protection? Webcompat? Additionally, is there a reason the cookies for a non-parameter having URL do not have a lifetime cap too? |
https://webkit.org/tracking-prevention/#7-day-cap-on-all-script-writeable-storage says all storage that's written by the client has the 7-day cap, with a bit of variation in that cookies are (max) 7 calendar days while other storage is 7 days of browser use. So client-written cookies are deleted after 7 days, but server-written cookies aren't. That indicates that Safari's threat model is that actors with server cooperation are allowed to do more tracking than actors that are constrained to the client. (I have PR #21 to better incorporate this into the existing-mitigations section. Comments and improvements are welcome.) |
Thanks, those changes help make things clearer, and seems to have a substantive update! That is a good insight about server cooperation vs included javascript. I'm still curious about the particular choices with navigational tracking protection though. There are enough specifics that it seems like there some well thought out reasoning behind the curtain! |
We need to document a threat model for this work. In particular, we should describe what capabilities actors are assumed to have and which of their goals we plan to either block or allow. Like in https://w3cping.github.io/privacy-threat-model/#model-cross-site-recognition, there may be multiple kinds of actors with different capabilities, and some kinds of actors might be able to achieve goals that we could frustrate for other kinds of actors.
Some possible capabilities:
Some possible goals:
I think we should start by brainstorming more capabilities and goals, and after that discuss what goals we can and should frustrate or allow.
The text was updated successfully, but these errors were encountered: