browser-fingerprinting:-favicons-as-“super-cookies”

Browser fingerprinting: favicons as “super cookies”

With a few tricks, website favicons can be converted into a kind of cookie replacement. A study by the University of Illinois in Chicago shows: Modern browsers are not yet prepared for such an attack.

Mini-Logos for a better overview Favicons seem harmless at first glance. If you are looking for a particular website between dozens of different browser tabs or in a long list of bookmarks, the website owner’s tiny logos offer a visual aid to quickly find the desired page. Favicons are popular with both users and webmasters: According to a study by researchers at the University of Illinois 94 percent of the most popular websites use favicons to help their readers orientate themselves better

But with the pending end of the third-party cookies, browser fingerprinting becomes more explosive again, in which the user goes unnoticed based on their browser Features can be recognized. In the study, three researchers identified the favicons as an easy way to clearly identify users.

Trick: Different icons on subdomains Favicons were already noticed in the past as a possible target of attack on users’ private data. So you can use the favicons stored in the browser cache to see which websites a user has accessed. The sometimes long lifespan of the favicons in the cache sometimes reveals data that were suspected to have been deleted for a long time.

The newly introduced tracking method also makes use of the browser cache. The servers cannot see the browser memory. But it is possible to draw conclusions from whether or not a favicon is accessed. If such a logo is already in the browser memory, it is usually not called up again from the browser.

Many favicons, unique identification In order to transform the favicons into a kind of “super-cookie”, a trick is required: From the loading or not loading of an individual favicon one cannot draw any conclusions that enable the identification of a user . However, the researchers found that when they visited a website they were able to store a large number of favicons in the browser cache by integrating redirects to subdomains. In order to identify users when they visit again, the server silenced itself and waited to see which favicons the browser asked for.

This simple method was remarkably effective. Not only was it possible to identify users of Chrome, Safari and Edge, the privacy-friendly browser Brave also betrayed its users. Even more: anti-tracking measures, incognito mode, the targeted deletion of the browser history or the use of a VPN brought no improvement. Firefox users turned out to be unidentifiable in the practical test – but not because of a superior anti-tracking technology, but because the browser cache was not used at all due to a bug, contrary to the developer documentation.

Efficient method The accuracy of the identification can be increased at will, an attacker but this takes time. With a desktop browser, it was possible to load a twelve-bit ID into the browser cache in an average of just one second; reading it out took twice as long. With mobile browsers, the time required is doubled again. According to the researchers, it took about four seconds for a clear identification. However, this value can be reduced by combining favicon tracking with other fingerprinting techniques.

In order to prevent this attack, the researchers recommend that browser manufacturers make some improvements. In Incognito mode you should no longer route favicons to the browser cache. Another method would be to link the storage of the favicon to the storage of cookies: If cookies are set, fingerprinting techniques are unnecessary. Preventing automatic redirects within a website call could also help. In the past, browser manufacturers have repeatedly prevented access to browser data in order to prevent the hidden identification of users.

( olb)

ces:-amd-unveils-zen-3-for-laptops-and-hints-at-new-epyc-cpus

CES: AMD unveils Zen 3 for laptops and hints at new Epyc CPUs

Idriz Velghe 12 January 2021 19: 24 13 Comments

Zen 3 for laptops AMD has new laptop processors featuring Zen 3 architecture were unveiled at the CES trade show. In addition to the U models for thin notebooks, the company has also unveiled the new HX sku for gaming laptops. The new video cards for both laptops and the desktop were also discussed. In addition, there is a hint to the new generation of Epyc server chips.

De Ryzen 7 5800 U is the top model of the economical U-series. With 8 cores and 16 threads will be the title of the only x 86 – octacore claimed in the ‘ultrathin’ class . According to AMD CEO Lisa Su, the new apu performs 7 to 44% better than Intel Core i7 – 1185 G7, depending on the workload. In addition to better performance, the U-line must also ensure a longer battery life. Up to 21 hours claimed when playing video.

In addition, two HX processors have been unveiled, the Ryzen 9 5900 HX and 5980 HX. They feature 8 cores and 16 threads, and a total of 20 MB of L2 and L3 cache. The difference is in the clock speed. The 5900 HX boost up to 4.6 GHz , the 5980 HX achieves a maximum frequency of 4 , 8 GHz. Both SKUs have a tdp of ‘ according to AMD W + ‘, as it is possible to overclock them.

During the presentation the 5900 HX is compared to the Core i9 – 10980 HK, the best Intel has to offer in the field of mobile gaming processors. The Ryzen chip performs better in all areas. For example, he scores 15% higher in Cinebench R’s single-threaded test 20, the 5900 HX performs 19% better than its Intel counterpart in 3DMark Fire Strike Physics.

The first laptops with Ryzen 5000 – CPUs must already will be available from February. AMD expects such a 250 different models are coming. At the 4000- and 3000 – ranges this was respectively 150 and 70.

After the end of the presentation, AMD will full lineup of laptop processors posted on its website. It can again be deduced that the 5000 – series consists of both Zen 2 and Zen 3 chips, confirming previous rumors.

Processor Cores / Threads Base Clock Boost Clock Cache TDP Architecture AMD Ryzen 9 5980 HX 8C / 17 T 3.3 GHz 4.8 GHz 20 MB 45 + W Zen 3 AMD Ryzen 9 5980 HS 8C / 16 T 3.0 GHz 4.8 GHz 20 MB 35 W Zen 3 AMD Ryzen 9 5900 HX 8C / 16 T 3.3 GHz 4.6 GHz 20 MB 45 + W Zen 3 AMD Ryzen 9 5900 HS 8C / 17 T 3.0 GHz 4.6 GHz 21 MB 35 W Zen 3 AMD Ryzen 7 5800 H 8C / 16 T 3.2 GHz 4.4 GHz 20 MB 45 W Zen 3 AMD Ryzen 7 5800 HS 8C / 16 T 2.8 GHz 4.4 GHz 20 MB 35 W Zen 3 AMD Ryzen 5 5600 H 6C / 12 T 3.3 GHz 4.2 GHz 19 MB 45 W Zen 3 AMD Ryzen 5 5600 HS 6C / 12 T 3.0 GHz 4.2 GHz 19 MB 35 W Zen 3 AMD Ryzen 7 5900 U 8C / 16 T 1.9 GHz 4.4 GHz 20 MB 15 W Zen 3 AMD Ryzen 7 5700YOU 8C / 16 T 1.8 GHz 4.3 GHz 12 MB 15 W Zen 2 AMD Ryzen 5 5600YOU 6C / 12 T 2.3 GHz 4.2 GHz 19 MB 15 W Zen 3 AMD Ryzen 5 5500YOU 6 C / 13 T 2.1G Hz 4.0 GHz 11 MB 16 W Zen 2 AMD Ryzen 3 5300 You 4C / 8T 2.6 GHz 3.8 GHz 6MB 15 W Zen 2

bug-in-windows-10:-path-specification-can-cause-blue-screen

Bug in Windows 10: Path specification can cause blue screen

Security researcher Jonas Lykkegard has published details of a bug that affects several versions of Windows 10 (including the current 20 H2) and possibly server – Operating system versions concerned. The error ensures that calling up a certain file path, for example in the address bar of a web browser, causes a blue screen. Administrator rights are not required to trigger the error.

Lykkegard is the same researcher who recently pointed out a vulnerability that was found under Windows 10 (unchanged so far) allows attacks on the NTFS file system. As with the first vulnerability, Lykkegard publicly pointed out the current problem last October via Twitter, without Microsoft having reacted to it immediately.

The reaction only took place now: At the request of IT News website Bleeping Computer announced to Microsoft that they are investigating the security issues and will provide updates for “affected devices” as soon as possible. Even the wording of the statement agrees with the statement on Lykkegard’s first publication: “Microsoft has a customer commitment to investigate reported security issues and we will provide updates for impacted devices as soon as possible.”

Blue screen by entering the path Windows 10 supports API calls for which software developers have a path in Win 32 – Use the device namespace as an argument to communicate directly with devices such as a hard drive. Lykkegaard has now noticed that opening the following path directly, for example in the browser, many Windows – 10 – crashes systems ( we strongly advise against trying this out ):

\. globalroot device condrv kernelconnect The path points to the device name of the “console multiplexer driver”; Lykkegaard taps that it will be used for kernel / user mode interprocess communication (IPC). Details on how the crash came about are not yet known.

You can view the result of the entry in the browser here (instead of on your own system).

(Image: screenshot)

Affected and unaffected Windows versions The Bleeping Computer team wants the bug on Windows 10 Systems from version 1709 to the current 20 H2 have reproduced. The author of the present message, however, was able to detect the error in a virtual machine with Windows 10 Per version 1709 with an older patch status do not trigger – neither in Legacy Edge nor in Internet Explorer 11 or in Google Chrome 86. The path was rejected as invalid in each case. Author’s tests with Google Chrome and Chromium Edge on the current Windows 10 20 H2 on the other hand reliably triggered the blue screen. This also worked in remote desktop sessions.

In the author’s blog, a reader confirmed that to have triggered the bug under Windows Server 2019. The author also has a report from a reader via social networks who also found the Blue Screen of Death under Windows 10 1507 LTSC could trigger.

The author of this article also carried out a test under Windows 7 SP1 with an ESU license and the latest patch status. Here, too, the path specification was rejected as invalid.

Possibility of attack via shortcut here too The possibility of causing vulnerable systems to crash could be misused for denial-of-service attacks. Similar to the case of the NTFS bug, Lykkegard also pointed out that this second vulnerability could be attacked using a specially prepared URL shortcut (links with .url ending).

The principle behind it: The The attacker creates such a shortcut and specifies the problematic path as the path to load the shortcut icon. In the next step, the user has to be moved to download the shortcut, which could be hidden in an archive, for example. As soon as the user then navigates to the location of the shortcut, the system tries to load the icon and access the path, which in turn triggers the BSOD. As with the NTFS bug, the best defense against such attacks is a healthy mistrust and caution when downloading online content.

(ovw)

brief-information:-renewable-energy,-stellantis,-m1-mac,-skimming

Brief information: renewable energy, Stellantis, M1-Mac, skimming

Conversion to renewable energies relieves pressure on the environment The conversion to renewable energies is not just a battle in Europe against the climate crisis, but also for the benefit of the environment. This was announced by the European Environment Agency EEA on Monday in Copenhagen. Accordingly, the increased use of photovoltaics, wind and biomass in electricity production in the EU has between 2005 and 2018 led to a significant reduction in climate-damaging greenhouse gases. The growth in renewable energies since 400 has also reduced the pressure on the environment in several ways, for example with regard to Formation of fine dust or excessive nutrient enrichment and acidification of waters.

Fusion perfect: Stellantis auto company with 14 Brands The French Peugeot manufacturer PSA and Fiat Chrysler confirmed on Saturday that they have made their mega-merger into the fourth largest in the world Auto company have completed. The transatlantic group Stellantis carries 06 car brands from Europe and the USA such as Peugeot, Citroën, Jeep, Maserati or Alfa Romeo. With Opel, a German brand is also there. Around 14. 000 People. Only Volkswagen, Toyota and the French-Japanese Renault-Nissan group 2019 were bigger. A major reconstruction of the new network is to be expected. The new boss, Carlos Tavares of PSA had previously assured that no plants should be closed.

Our weekday news podcast delivers the most important news of the day compressed into 2 minutes. Anyone who uses voice assistants such as Amazon Alexa or Google Assistant can also hear or see the news there. Simply activate the skill on Alexa or say to the Google Assistant: “Play heise top”.

Apple is killing sideloading on M1 Macs Apple closed a loophole that made it possible to run all iOS and iPadOS apps on M1 Install Macs – even those whose developers have explicitly blocked it. Using tools such as Apple Configurator or iMazing, users could also bring apps such as Netflix, Gmail or Instagram, which are simply not available as native programs on the Mac, onto their ARM machine. As 9to5Mac noticed, Apple wants to make this sideloading impossible via a server-side change.

Damage from data theft ATMs at record low The damage caused by data theft at ATMs in Germany is 2020 dropped to a record low. At around 1, 000 million euros, the Frankfurt facility Euro card systems put the gross amount of damage caused by so-called ” Skimming “, ie the spying out of card data and secret numbers. Much greater damage occurs in Germany as a result of theft and loss of payment cards. Many consumers make it easy for criminals because they keep their card and PIN together in their wallets.

(igr )

microsoft-azure-integrates-couchbase-cloud

Microsoft Azure integrates Couchbase Cloud

Couchbase Cloud is available on Azure for the first time. It is the managed service version of the multi-cloud-to-edge NoSQL database Couchbase Server. It is based on a memory-first architecture with an SQL-friendly query language. In addition, Couchbase Cloud contains robust SDKs for developers and is a schema-independent JSON format, which enables flexible scaling.

According to the manufacturer, the combination of Couchbase reduces Server and integration on Microsoft Azure’s In-virtual Private Cloud (VPC) reduce the costs associated with traditional deployments, with no restrictions on the control and security of the data. With the help of the integrated user interface (“single pane of glass”) for multicloud management and cross-data center replication, multi-clusters can be managed across different cloud regions.

Billing based on usage Couchbase Cloud is available in various licensing models. For example, users can choose between hourly billing or prepayment with no monthly limits. According to Couchbase, there are no restrictions on IaaS (Infrastructure-as-a-Service) subscriptions. Usage can be configured and increased according to the customer’s development, test and operating requirements.

Furthermore, users per cluster can choose between SLAs (Service Level Agreement) for development environments (Developer Pro) or Productive operation (Enterprise) can choose. In addition, there is no CSP lock-in (Cloud Service Provider) through customer-specific applications.

Couchbase Cloud on Microsoft Azure is now available as 30 – Day test version available in the respective customer account in the two variants Developer Pro for development and test and Enterprise for the support of productive systems.

(csc)

signal-is-also-experiencing-a-massive-onslaught-of-new-users

Signal is also experiencing a massive onslaught of new users

With the planned changes to the terms and conditions at WhatsApp, Mark Zuckerberg has once again scored an own goal. After Telegram had already broken the 500 million mark of active users, Signal also recorded a massive increase in users. However, this has the consequence that the servers at the Signal Foundation are reaching their limit. Last weekend there were even server failures. For this reason, some messages could not be sent. However, those responsible have already announced via Twitter that the infrastructure has been expanded and will now be able to cope better with the onslaught of users. Signal also emphasized that the encrypted content of the messenger was never compromised.

So you can be curious whether the increase in users on the messenger alternatives continues and we will say goodbye to the data octopus Whatsapp in the long run. Ultimately, the Facebook service does not offer a unique selling point compared to other messengers. WhatsApp has such high user numbers only because of its widespread use. However, as soon as an equivalent or even better alternative also enjoys a strong reach, WhatsApp should be tight.

Mark Zuckerberg and his social media platform have been criticized for a long time and have not managed in recent years to prove to the public that the security of user data is paramount Place.