There's this article which explains how its done.
https://www.ghacks.net/2021/01/22/favicons-may-be-used-to-track-users/
I don't understand the technical details. But I hope Orion defends against this fingerprinting method.
There's this article which explains how its done.
https://www.ghacks.net/2021/01/22/favicons-may-be-used-to-track-users/
I don't understand the technical details. But I hope Orion defends against this fingerprinting method.
Looking at this, a few angles for what Orion could do. I haven't checked if it does any of these:
I think these 3 things would effectively mitigate these issues, since
@Vlad @gp
One additional thing I'd like to request.
In Safari, clearing history also clears favicon cache (this includes favicon of favorites and bookmarks). So the next time, the browser starts, requests are made to each of these domain to cache favicon. This is not ideal and AFAIK potentially a way to track and fingerprint users (especially when Orion implements clearing data on exit).
So something needs to be done about favicon of favorites and bookmarks in Orion, apart from what gp already mentioned.
I'm unsure if that is a problem - it strikes me the specific risk about favourites/bookmarks can be addressed by locally storing a cached copy of each, at browser/profile level, but not making an entry in the cache table. That at least avoids a cached entry being created by Orion itself.
That way, browser behaviour when visiting a website will be identical whether the site is favourited or not.
If your concern is about the user's traffic being fingerprintable as a result of a series of sequential fetches of favicons from a wide range of servers, that would be a valid concern. However, your options are quite limited, and this gets more complex. You now have to start implementing a range of different and complex threat model scenarios - a "local attack" scenario won't want to leave favicon caches lying around on the device. A "network observer" scenario will want to minimise fingerprintable DNS/HTTPS requests being made at browser open.
One option could be to "passively" cache favicons.
If a site is saved as a bookmark, we can say the "local attack" scenario is rejected. If you are concerned about this, browse in private mode and don't use bookmarks, as someone can just look at your bookmarks.
If you save the site as a favourite, you could:
This feels like a separate suggestion though in itself (for quite a niche and extreme threat model scenario), and not really linked at all to the paper from above.
There is a marked issue with favicons.
For starters, it has to reload all favicons in existence every single time you login, even for websites that are visited not so often, which opens up a plethora of implications for privacy minded folks.
Also they are used maliciously to deliver vectors and malware and the like.
https://github.com/jonasstrehle/supercookie
See this for example, an open source program
Orion purports itself to be the privacy focused browser, so it must take the measures to mitigate even the most novel favicon silly techniques used, such as sandboxing and limiting favicon writing from websites.
The cache management seems to be an interesting feature
https://stackoverflow.com/questions/1831123/are-cross-domain-favicons-a-security-risk
gp Since this post is related to https://orionfeedback.org/d/9585-history-isnt-completed-gone-despite-asking-orion-not-to-have-it, we're implementing the first two of the suggestions to mitigate this issue now.
(For the third suggestion, Orion doesn't as of now have containers as suggested in https://orionfeedback.org/d/43-something-like-firefox-multi-account-containers-by-default/, but different profiles do have different favicon stores)