Skip to content

umutbasal/deprivacy-sandbox

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Deprivacy Sandbox

Introduction

This research aims to broke privacy sandbox. It seems we can extract small bits of info with entropy attack and unlimited with timing attacks. These techniques can be combined for more effective results.

Entropy based attack

First attempt was to abuse selecturl and shared state to identify user cross site. But no luck. There is budget mechanism to prevent abuse. https://github.com/WICG/shared-storage?tab=readme-ov-file#budgeting

2 char identifier :d

  • Latest result is extracting 4 bits of information to local storage by using navigation budget.

Time based attack

Entropy-based attack faces budget issues when log2(urls) is greater than 0. As we can run sleep in worklets, we can utilize time to extract information. Passing a single URL means log2(1 URL) = 0. We can use this method to extract information without any budget constraints.

Alt text

Try

Enable privacy sandbox flags and add http://localhost:8080 to site list.

Alt text

Run go run entropy-based/main.go and go run time-based/main.go to see results.

About

This research aims to broke privacy sandbox

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published