Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"You can't get very far in this world without your dossier being there first." -- Arthur Miller


computers / alt.windows7.general / Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."

SubjectAuthor
* FireFox new "Total Cookie Protection stops trackers from usingBob F
+- Re: FireFox new "Total Cookie Protection stops trackers from usingPaul
+- Re: FireFox new "Total Cookie Protection stops trackers from using cookies to sNomen Nescio
`- Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stVanguardLH

1
FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."

<t7eap7$qm0$2@dont-email.me>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=4366&group=alt.windows7.general#4366

  copy link   Newsgroups: alt.windows7.general
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: bobnospam@gmail.com (Bob F)
Newsgroups: alt.windows7.general
Subject: FireFox new "Total Cookie Protection stops trackers from using
cookies to stalk you around the web."
Date: Fri, 3 Jun 2022 17:59:19 -0700
Organization: A noiseless patient Spider
Lines: 6
Message-ID: <t7eap7$qm0$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 4 Jun 2022 00:59:19 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="bb550002d80ff49c7eab955f6dfc7f3e";
logging-data="27328"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18fPWPNWs55u6ioEltzuorr"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.9.1
Cancel-Lock: sha1:SfNDonOI+o9KF04cW70v/NtuD70=
Content-Language: en-US
 by: Bob F - Sat, 4 Jun 2022 00:59 UTC

"Firefox builds a fence around cookies, limiting them to the site you’re
on so trackers can’t use them to follow you. With early access, you’ll
help optimize this feature so we can keep building a better web for
everyone."

Would you activate this? Why or why not?

Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."

<t7f0p0$1vqe$1@gioia.aioe.org>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=4368&group=alt.windows7.general#4368

  copy link   Newsgroups: alt.windows7.general
Path: i2pn2.org!i2pn.org!aioe.org!wKOQXwthE3qNzCdODXx6NA.user.46.165.242.75.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: alt.windows7.general
Subject: Re: FireFox new "Total Cookie Protection stops trackers from using
cookies to stalk you around the web."
Date: Sat, 4 Jun 2022 03:14:41 -0400
Organization: Aioe.org NNTP Server
Message-ID: <t7f0p0$1vqe$1@gioia.aioe.org>
References: <t7eap7$qm0$2@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="65358"; posting-host="wKOQXwthE3qNzCdODXx6NA.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: Paul - Sat, 4 Jun 2022 07:14 UTC

On 6/3/2022 8:59 PM, Bob F wrote:
> "Firefox builds a fence around cookies, limiting them to the site you’re on so trackers can’t use them to follow you. With early access, you’ll help optimize this feature so we can keep building a better web for everyone."
>
> Would you activate this? Why or why not?

They know how advertisers track people.

And cookies is just one mechanism.

In fact, with cookies completely wide open, sites
will still say things like "Don't block cookies because
we need those". When in fact, they are actually complaining
about storage areas other than the cookie file. While in
the year 2022, cookies are still set, no web developer really
expects them to be there on a subsequent visit.

Any time someone uses terminology like "cookies", you
know they're full of shit. That's not how browsers are
abused for best persistence.

*******

https://samy.pl/evercookie/

EXAMPLE

Cookie found: uid = undefined

Click to create an evercookie. Don't worry, the cookie is a
random number between 1 and 1000, not enough for me to track
you, just enough to test evercookies.

+-------------------------------+
| Click to create an Evercookie | <===
+-------------------------------+

After clicking the button, do your very best to clean the
caches on the browser. Then, revisit that URL above. Did
the cookie value get "recovered" ? Then you still have some
mechanisms on board which are caching visit info.

pngData mechanism: undefined
etagData mechanism: undefined
cacheData mechanism: 657 <=== missed some cleaning spots
userData mechanism: undefined
cookieData mechanism: undefined
localData mechanism: null
globalData mechanism: 657 <===
sessionData mechanism: null
windowData mechanism: 657 <===
lsoData mechanism: undefined
slData mechanism: undefined

One of the concerns is about "cookie theft" via cross-site exploit.
Even though site "X" may do a lot to store persistent info,
site "Y" may try to steal it.

It's all a bit like leaving an apple pie on
a window sill to cool. And then being surprised
when the pie is gone.

Paul

Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."

<9f835111da05592d9cae82cd9f6c13fb@dizum.com>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=4374&group=alt.windows7.general#4374

  copy link   Newsgroups: alt.windows7.general
Injection-Info: neodome.net;
posting-account="mail2news";
key="qJjzAjw3O0mxv4Nasp0xRaKP0f2hqn09DQJu/7FV3IErCaYi0IIWjMTBOFgN9vte+UtnN4
SRWKFJYd7e/GaxeTSRNHBXUFZb4Jf0/NDeXgedHpZ7ggvNdT0wNvrJ1GXbdRDp+RqYX+D67Udvd
UwPT1EO446W8ES+0wQAgC+kWicrT15A81Fgoemu0iMbUSuBivwoKJTY/JY2qwOFZ/Ow6zrckB9q
fHfZgme8pguDMHNnJOjtZOBA9f8Vp+OUo8DCwLWqIeWLZiqfG/hYLt6ZqSVptzq5mnmb3l8XTvd
RlVRYP9wc8tK5rV1JbBrmcQ6ufOwR80tD0zfiNgjeyQWMIQ==";
data="U2FsdGVkX1+9YmkslHWi8SKm6Ffnhs+DmAPvoIPYac/gzQFiqew1cMsqQUinef/6OIFIr
gvAReAyacl5wMtG4q2V4qNNoY4NeQYKKgTD5Y8/uvAlTYLTRQFR2pQ4YjidhpI99fiXfbQe6Eb5
ChTnuGS4GQY23sDF7Xvv6tyYh5335vpX/XT73WxUdpjMj5DxBGSNAQTQgjVXDFmNWk3iunY198+
HxDubwSc2mUw2TAe65FVy6fDyzrpQBSbZtZsDRi9P3BAhZ7HkeqalOchbTI0Ck/vnhkpHO6+27c
OGz0/O4EFMfYZuMiVXNK6m37ehhMtyz+58MCICyIgdoBKM4Ei03JeFTtm58NMTxMnULYpV69+Mo
MOte53aiuw/1y12zwsSzWHGn/jV/w0Cu+HhIwx1laSeVo9XSzY2XebJ6VgK/MdGmpVUvNsFYcfN
inMZ/6yyPlPahCd7who0sd5yaSscbIt0o6QeQxFmikz9lCfkrmniYGoNC7r/M4Ocm0BZH9EMG22
lkUexoSOk14ApFijsIpa/kqkQSL7QHBWzPuLVy3/SF+xqmsLyj+9Gg2CaLaS1q1PPFGrOpu0K7B
F3Q/OF6I3b4fH5nUtJzAPS45gT4j5CqQBTe/RZPylMBu7fISvmR6A7nJ2F4D7CiIWcrAhgdu8J5
NsoP23Y5T7yGA6Bfh5fso1JTIRvefiJtEF1Nf0cnYQpHG6AQPfspNdtY7LQ93Xvz8Up/u8gh+16
w7G2VpGfr1wSbXXQaW6K6mBU3rLoj5QcClvZ82pohU6j50M/0+oewctb3UV+wczMoY0i3bU4YMt
b7SEGAnf15Z8Jju4/PCSwnzvhuQvH3lmDb/6yoGVrORYzH0KZ4nrpmLuItRZ94xNscct5SPSobd
sL+JNGaVYHjDWPQaR+MvOV+ugOwNdG2ek00KzGkFa+nzSab5Ejzndv7qq2h5D5u3P0Gh2F1i2OR
vH/JLVJ2rbgs3HJgfUDBj+L6+oBAHge1v6BMAe3Zop88cn+23F8hvZ3UFxu23Pdnb2LRZgizVdr
KuBY96NqYLxs5S6hvBi4FWYnNKqpbqAL6fsxVs/aRRxySrpPTy+QM+cNFzuUtQNDg3RXCB4KtiP
CI4GDmX2o+wAC/IUpdhDgGIXGvdqSk+muzYhXn0xtqm7ePw9QXfL9s6QIC517CdTwDMzlQw3p0w
SBVPmoBvyyQ83kDrQAYQ1SfDU0YBVOHoIDB31boRTccyZVVQMB2KkdZKzmgCXVggfyMcGU9Kb0n
iTvkB95dB2URvUBuMUdth69vvh6WjwoV5NRca3wDRfOVqcFOw9xS38=";
mail-complaints-to="abuse@neodome.net"
Message-ID: <9f835111da05592d9cae82cd9f6c13fb@dizum.com>
Path: i2pn2.org!i2pn.org!news.neodome.net!mail2news
References: <t7eap7$qm0$2@dont-email.me>
Injection-Date: Sat, 4 Jun 2022 17:25:01 +0000 (UTC)
From: nobody@dizum.com (Nomen Nescio)
Newsgroups: alt.windows7.general
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@dizum.com>.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
Date: Sat, 4 Jun 2022 19:24:09 +0200 (CEST)
Subject: Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."
 by: Nomen Nescio - Sat, 4 Jun 2022 17:24 UTC

In article <t7eap7$qm0$2@dont-email.me>
Bob F <bobnospam@gmail.com> wrote:
>
> "Firefox builds a fence around cookies, limiting them to the site you�re
> on so trackers can�t use them to follow you. With early access, you�ll
> help optimize this feature so we can keep building a better web for
> everyone."
>
> Would you activate this? Why or why not?

Even though I'm not a tekkie, I can almost promise you they're lying
one way or another to hide the real truth regarding your being
tracked.

All this tracking crap and AV's filling my machine with all kinds of
intrusive crapola is why I dumped those p.i.a. "security" measures
and simply operate with a freebie sandbox program. Screw worrying
about all that crap, plus it's a hell of a lot cheaper than what all
those "security" proggies cost today. Matter of fact, I'll bet a lot
of those "security" proggies also gather a ton of info about you.

Been operating with this sandbox for years without a problem.

Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."

<1rwavva8bsdc8$.dlg@v.nguard.lh>

  copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=4376&group=alt.windows7.general#4376

  copy link   Newsgroups: alt.windows7.general
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!3.eu.feeder.erje.net!feeder.erje.net!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: V@nguard.LH (VanguardLH)
Newsgroups: alt.windows7.general
Subject: Re: FireFox new "Total Cookie Protection stops trackers from using cookies to stalk you around the web."
Date: Sat, 4 Jun 2022 14:44:37 -0500
Organization: Usenet Elder
Lines: 92
Message-ID: <1rwavva8bsdc8$.dlg@v.nguard.lh>
References: <t7eap7$qm0$2@dont-email.me>
Reply-To: invalid@invalid.invalid
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-13"
Content-Transfer-Encoding: 8bit
X-Trace: individual.net ql2J6UHO5jRz+KSbxAj5QwOrhGLdDcSfXpwAFu1gz4LgFaxQ7r
Keywords: VanguardLH VLH811
Cancel-Lock: sha1:jDIIqvVH+XeJOH5qjAPyMB1omYI=
User-Agent: 40tude_Dialog/2.0.15.41
 by: VanguardLH - Sat, 4 Jun 2022 19:44 UTC

Bob F wrote:

> "Firefox builds a fence around cookies, limiting them to the site
> you’re on so trackers can’t use them to follow you. With early
> access, you’ll help optimize this feature so we can keep building a
> better web for everyone."
>
> Would you activate this? Why or why not?

This has been in Firefox since version 86, but only in Strict security
mode, by default. That is, if you configure Firefox to use Strict
security mode (about:preferences#privacy, Enhanced Tracking Protection
aka ETP) then you already have the Total Cookie Protection (TCP). Most
users don't use Strict mode, and use the Standard security mode which is
the default. All Mozilla is doing is preparing to migrate TCP from
Strict mode to include it into Standard mode, and, of course, first
doing as an experiment to determine what negative impact TCP may cause.
Up to you if you want to participate in the study of the experiment.

Strict mode already provides a warning that some sites may break at that
level of privacy. Mozilla has not yet offered me the TCP feature in
Standard security mode (I have studies disabled in Firefox), so I'll
have to wait until Mozilla pushes TCP into Standard security mode in a
later GA release. Only then can I see if TCP added to Standard mode
also displays the same warning about possibly breaking some sites that
is noted in Strict mode.

I don't see how enforcing the domain restriction on access to cookies
should cause a legitimate failure of a site to use its own cookies. TCP
just ensures the site that created the cookie is the only site that can
access the cookie which was the privacy model intended for cookies in
the first place. In the past, the web client was /supposed to/ ensure
that the domain that accessed a cookie .txt file was the domain that
owned the cookie (which unfortunately may not the same as who wrote the
cookie). It was possible for one domain to open and write to a cookie
file, but the domain listed within the cookie was for another domain, so
a visit to the other domain would allow that other domain to read the
data the prior domain wrote into the cookie.

Firefox added cross-site cookie protection a very long time ago to plug
that privacy hack. That protection has been in Firefox ever since ETP
was added, or maybe even earlier. Mozilla isn't detailed in just how
TCP isolating a cookie into a "domain jar" ensures further privacy.
Just what additional tracking or abuse via cookies gets neutered by
using "jars" to isolate cookies is not well detailed. Possibly a good
privacy feature, but little in-depth information.

This hasn't been important to me due to how I configure Firefox to purge
ALL locally cached data on its exit (which also thwarts HSTS super
cookies), and I don't leave Firefox running between uses. When done
using Firefox, I exit it which purges all locally cached data. I do not
leave Firefox loaded until its next use.

https://blog.mozilla.org/security/2021/01/26/supercookie-protections/:
Firefox 85 partitions all of the following caches by the top-level
site being visited: HTTP cache, image cache, favicon cache, HSTS
cache, OCSP cache, style sheet cache, font cache, DNS cache, HTTP
Authentication cache, Alt-Svc cache, and TLS certificate cache.

https://www.theregister.com/2021/01/27/firefox_85_crumbles_supercookies/
Firefox 85 fights back by using “a different image cache for every
website a user visits.

Perhaps that means also HSTS super cookies aren't a problem anymore, and
why the demo site by RadicalResearch disappeared to test if HSTS super
cookies could still be used for tracking (which previously to thwart
required flushing the site preferences in Firefox, like on its exit).
Looks like the "cookie jar" scheme is another isolation aka partitioning
scheme to prevent abuse of that type of local storage. FF 85
"partitioned" lots of locally cached data to restrict what domain can
access what locally cached data, and FF 86 added cookies to the same
type of protection, but only in Strict mode. Now Mozilla wants to add
TCP to Standard privacy mode. "Systematic network partitioning makes it
harder for trackers to circumvent Firefox’s anti-tracking features, but
we still have more work to do to continue to strengthen our
protections." Looks like the "more work" included partitioning of
cookies, too, and not just in Strict mode.

The protections added in FF 85 were a good thing. I don't see migrating
TCP from Strict to include in Standard mode as a bad thing. The only
sites that might puke on the isolation of their cookies are those that
are trying to abuse their intended purpose. I'm using Strict mode for
now which gives me TCP. Unless it severely impacts my web browsing,
I'll stick with Strict mode for now, and won't care if TCP gets added to
Standard privacy mode.

Client-side protections have no effect on sites that cooperate with each
other to share visitor data. Nothing client-side can deter server-side
data sharing. It's easier to abuse cookies to transport data from one
site to another. Server-side processes to share data is a bit more
difficult to setup, but not when the libs and scripts are readily
available to build that data transport between servers.

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor