Hacker News new | past | comments | ask | show | jobs | submit login

Basically, if a site uses the Facebook SDK to start the authenticaion flow, it will be broken because it's blocked.

SmartBlock just stands in for that blocked script, acting just enough like the real API to prevent some common site breakage.

This lets it detect when sites try to open the popup-based authenticaion flow, unload the stand-in script, load the real one, and continue the login flow.

It only unblocks some Facebook resources, as listed here: https://searchfox.org/mozilla-central/source/browser/extensi...

It only unblocks it for that specific website (the domain in the tab URL), and only until Firefox is closed. Other trackers continue to be blocked, and other tracking protections stay in place (as opposed to turning off ETP for the site entirely).




> This lets it detect when sites try to open the popup-based authenticaion flow, unload the stand-in script, load the real one, and continue the login flow.

I guess how it detects the "when sites try to open the popup-based authenticaion flow" is the attack vector. If it's Javascript, it's likely to be easily exploitable. If it's in the browser's chrome I suppose it would take a malicious add-on or similar device.


Lead dev here. Yes, this is a give-and-take that probably will never be "perfect" for everyone.

Right now a site could disingenuously call the relevant Facebook SDK API to unblock the Facebook resources listed here, and only on that site: https://searchfox.org/mozilla-central/source/browser/extensi...

I'm not too sure why that would be worthwhile as an attack, though. If you have anything in mind that would make it so, please let me know.

In the meantime, I'm working on a way to further tighten this a bit so the unblocking will only happen if a popup is successfully opened (so that at least if the popup blocker kicks in, nothing will happen unless the user intentionally allows that popup). I'm not 100% sure if that will work well, but I hope so.


Thanks for your response! Also thanks very much for your efforts! I've been using Firefox exclusively for quite some time, and it's by far the best browser for me. The focus on privacy and user protections (like this one) has also already helped me convince a few people to switch over.

I think the main attack vector I'd be worried about is if the SDK itself implemented a way around this protection, rendering it relatively useless. If that's not a feasible exploit, then I wouldn't be overly worried about as it would take effort on each website maintainer to implement and maintain the exploit.

The "real popup" detection sounds like a great addition if it works well!


Right. We'll just have to see if and how Facebook reacts, but I would hope they prefer this kind of opt-in to their login buttons simply being broken in strict/private mode on many sites. In fact I think they're already getting sites to use an alternative login method which doesn't have to be blocked in the same way.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: