Hacker News new | past | comments | ask | show | jobs | submit login
Google Just Gave Millions Of Users A Reason To Quit Chrome (forbes.com/sites/gordonkelly)
27 points by obituary_latte on Feb 21, 2020 | hide | past | favorite | 8 comments



Correct me if I'm wrong, but the example given of a link with "cancer" in the scroll-to-text part wouldn't show up in a DNS query would it?

My understanding was that only the domain is queried, but the full path is not seen by a DNS server.


The images and other resources would be part of the query. I don't know how Chrome prioritizes loading of resources, but if it prioritizes those resources in the current view, it might be possible to tell specific information about a page based on DNS traffic.

Example: Let's say Chrome loads resources in the current view first, and you send a deep link with "cancer" as a search term. If a gullible user follows that link, then...

- If "cancer" does not appear, the first resources queried will be those at the top of the page.

- If "cancer" does appear, the first resources queried might be those used elsewhere in the page.


Doesn't it mean that by watching DNS requests for resources, one can also derive which path on a web server I am visiting? For instance when fetching over TLS, such attacker should be able to tell whether I requested https://example.com/dank-memes.html or https://example.com/just-text.html, right? If that's the case, then this feature (ScrollToTextFragment) will not make privacy worse that it is already and the worries are just contemporary security theatre.


It seems to me that the threat model has single page apps in mind. It's moot if the URL of interest is www.cancer.example.com/you-have-cancer anyway.


I'm missing something here. Fragments (everything from #to-the-end-of-url) are never sent as part of the request to the server.

As a developer, I can't even know if a user has a fragment server side. Instead, I'm forced to use JavaScript to read it.


The example that keeps getting put forwards seem unrelated to the new feature in the sense that you can do the exact same with a https://url#cancer link .


Don’t see a security issue here. Only the domain is sent to DNS, not the full uri.


Holy hyperbole batman. Flagged.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: