Follow

The idea of using just to fingerprint email clients and browsers is wild. The approach suggested in this repo

github.com/cispa/cascading-spy

and further paper

publications.cispa.de/articles

explain the technique that works even if is disabled.

They further explain that they reached out both to and where such exploits should be mitigated.

One example where such an exploit can cause even more precision is when it is incorporated into attacks. Since the exploit was also able to depict the operating system, meaning one could combine existing exploits for a more targeted attack.

@barefootstache From what i can understand, Tor isn't really safe to use as those kind of attack vectors are either not patched or not even considered as a vulnerability in the first place...
Here's an old blogpost:
hackerfactor.com/blog/index.ph
(and as far as i am aware, nothing much has changed since then.)

@barefootstache
So, that's TL/DR for me. One question: Does this attack work for those of us who read email in plaintext?

@paraplegic_racehorse from my understanding it depends on the email provider or service. So if the provider/service does not permit CSS, then no attack via CSS is possible.

Sign in to participate in the conversation
Qoto Mastodon

QOTO: Question Others to Teach Ourselves
An inclusive, Academic Freedom, instance
All cultures welcome.
Hate speech and harassment strictly forbidden.