[tor-bugs] #20214 [Applications/Tor Browser]: Ultrasound Cross Device Tracking techniques could be used to launch deanonymization attacks against some users

Tor Bug Tracker & Wiki blackhole at torproject.org
Mon Sep 26 23:12:50 UTC 2016


#20214: Ultrasound Cross Device Tracking techniques could be used to launch
deanonymization attacks against some users
--------------------------------------+----------------------------------
 Reporter:  VasiliosMavroudis         |          Owner:  tbb-team
     Type:  defect                    |         Status:  new
 Priority:  Medium                    |      Milestone:
Component:  Applications/Tor Browser  |        Version:  Tor: unspecified
 Severity:  Normal                    |     Resolution:
 Keywords:                            |  Actual Points:
Parent ID:                            |         Points:
 Reviewer:                            |        Sponsor:
--------------------------------------+----------------------------------

Comment (by VasiliosMavroudis):

 > Why wouldn't this work with audible sound? Audible sound ranges have
 been shown to be able to covertly issue voice commands to nearby mobile
 devices
 (​!https://www.georgetown.edu/sites/www/files/Hidden%20Voice%20Commands%20full%20paper.pdf).
 The core issue is not addressed by filtering out non-audible sound.



 It can absolutely work in the audible spectrum, and indeed there is one
 framework doing so already.

 However, our argument is not that ultrasounds are a plausible convert
 channel. Instead, we argue that the audio channel is already being used by
 frameworks embedded in apps, and that they are gaining traction in the
 market.

 Two examples of such frameworks:

 Inaudible: Silverpush
 (!http://www.forbes.com/sites/thomasbrewster/2015/11/16/silverpush-
 ultrasonic-tracking/#7b5f70824024)

 Audible: Intrasonics (http://www.intrasonics.com/technology-faqs/)


 > If a user is presented with a choice to play the media file or not and
 if they *believe* that they want to play it, they will play it. The prompt
 would only serve as an annoyance that the user would learn to ignore. If
 your attack involves tricking a user to visit a website, tricking a user
 to view or allow the media on the website to play would not be
 significantly more difficult.



 Absolutely. There are many possible ways to go about it. A prompt/popup
 comes with the advantage of actually educating the user, but indeed the
 user may get "blind" after a while. Same holds for all major browsers that
 use prompts to ask the user if access to a given resource should be
 permitted.

 > The security slider at 'High' already makes video/audio content click-
 to-play, with the current exception of !MediaSource video (see: !#19200).


 We totally agree with this choice. I'm not very familiar with the
 rationale behind each setting on the security slider. However, our
 suggestion would be to extend this feature to the low-default security
 setting (this may not be technically straightforward though, if you want
 to keep JS). Of course, from a usability perspective this is not very good
 for the user, but with such frameworks gaining traction it seems a
 reasonable reaction.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/20214#comment:2>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list