[tor-commits] r24672: {projects} Fix some minor style issues (projects/articles/browser-privacy)

Robert Ransom rransom.8774 at gmail.com
Tue Apr 26 15:02:34 UTC 2011


Author: rransom
Date: 2011-04-26 15:02:34 +0000 (Tue, 26 Apr 2011)
New Revision: 24672

Modified:
   projects/articles/browser-privacy/W3CIdentity.tex
Log:
Fix some minor style issues

Modified: projects/articles/browser-privacy/W3CIdentity.tex
===================================================================
--- projects/articles/browser-privacy/W3CIdentity.tex	2011-04-26 11:18:08 UTC (rev 24671)
+++ projects/articles/browser-privacy/W3CIdentity.tex	2011-04-26 15:02:34 UTC (rev 24672)
@@ -194,11 +194,12 @@
 The Panopticlick project by the EFF provides us with exactly this
 metric\cite{panopticlick}. The researchers conducted a survey of volunteers
 who were asked to visit an experiment page that harvested many of the above
-components. They then computed the Shannon Entropy of the resulting
+components. They then computed the Shannon entropy of the resulting
 distribution of each of several key attributes to determine how many bits of
 identifying information each attribute provided.
 
-While not perfect\footnotemark, this metric allows us to prioritize effort at
+While not perfect\footnotemark, this metric allows us to prioritize our efforts
+on the
 components that have the most potential for linkability.
 
 \footnotetext{In particular, the test does not take in all aspects of
@@ -246,38 +247,40 @@
 on a per-origin basis.
 
 An early relevant example of this idea is SafeCache\cite{safecache}.
-SafeCache seeks to reduce the ability for 3rd party content elements to use
+SafeCache seeks to reduce the ability for third-party content elements to use
 the cache to store identifiers. It does this by limiting the scope of the
-cache to the top-level origin in the url bar. This has the effect that
+cache to the top-level origin in the URL bar. This has the effect that
 commonly sourced content elements are fetched and cached repeatedly, but this
 is the desired property. Each of these prevalent content elements can be
 crafted to include unique identifiers for each user, tracking users who
 attempt to avoid tracking by clearing cookies.
 
-The Mozilla development wiki describes an origin model cookie transmission
-improvement written by Dan Witte\cite{thirdparty}. Dan describes a new
+The Mozilla development wiki describes an origin model improvement for
+cookie transmission
+written by Dan Witte\cite{thirdparty}. Dan describes a new
 dual-keyed origin for cookies, so that cookies would only be transmitted if
-they matched both the top level origin and the third party origin involved in
+they matched both the top-level origin and the third-party origin involved in
 their creation. This approach would go a long way towards preventing implicit
 tracking across multiple websites, and has some interesting properties that
 make user interaction with content elements more explicitly tied to the
 current site.
+% XXXX I can't tell what this paragraph is supposed to mean. --RR
 
 Similarly, one could imagine this two level dual-keyed origin isolation being
 deployed to improve similar issues with DOM Storage and cryptographic tokens.
 
 Making the origin model for browser identifiers more closely match user
 activity and user expectation has other advantages as well. With a clear
-distinction between 3rd party and top-level cookies due to double-keying, the
+distinction between third-party and top-level cookies due to double-keying, the
 privacy settings window could have a user-intuitive way of representing the
-user's relationship with different origins, perhaps by using only the favicon
+user's relationship with different origins, perhaps by using only the `favicon'
 of that top level origin to represent all of the browser state accumulated by
 that origin. The user could delete the entire set of browser state (cookies,
 cache, storage, cryptographic tokens) associated with a site simply by
 removing its favicon from their privacy info panel.
 
 The problem with origin model improvement approaches is that individually,
-they do not fully address the entire linkability problem unless the same
+they do not fully address the linkability problem unless the same
 restriction is applied uniformly to all aspects of stored browser state, and
 all other linkability issues are dealt with. Behind-the-scenes partnerships
 can easily allow companies to continue to link users to their identities



More information about the tor-commits mailing list