Closed diracdeltas closed 10 years ago
This is mostly already implemented (but commented out) in lib/policyCheck.js
. Some things that should be resolved:
@garrettr The timing of requests should be randomized, as I believe has been done in Chrome. Also, we should strip all cookies from the XHR request. Other than that, I don't have any privacy concerns that are blockers for 0.2.
@diracdeltas Definitely we should strip the cookies. Why does the timing of the request matter?
In particular, having a precise time of day for each user makes it easy to associate local network information over time with the same user.
@diracdeltas I don't think it could really extended to a practical fingerprinting technique, especially because of the many variables affecting timing consistency, the long interval, and that it wouldn't persist over browser restarts. But it is leaking some information for no good reason, and it is easy to mitigate.
So the algorithm should be:
What do you think? And do you want me to implement this?
@garrettr Agreed that it should be mitigated anyway. Your algorithm LGTM!
Would be great if you took this ticket.
Fixed by 0628e0788874fcd551fa650d845af075c18e3ce6
Analagous to https://github.com/EFForg/privacybadgerchrome/issues/94.