[tor-commits] r24684: {projects} Minor tweaks. (projects/articles/browser-privacy)

Mike Perry mikeperry-svn at fscked.org
Wed Apr 27 06:57:24 UTC 2011


Author: mikeperry
Date: 2011-04-27 06:57:24 +0000 (Wed, 27 Apr 2011)
New Revision: 24684

Modified:
   projects/articles/browser-privacy/W3CIdentity.bib
   projects/articles/browser-privacy/W3CIdentity.tex
Log:
Minor tweaks.



Modified: projects/articles/browser-privacy/W3CIdentity.bib
===================================================================
--- projects/articles/browser-privacy/W3CIdentity.bib	2011-04-27 06:11:22 UTC (rev 24683)
+++ projects/articles/browser-privacy/W3CIdentity.bib	2011-04-27 06:57:24 UTC (rev 24684)
@@ -85,9 +85,9 @@
 }
 
 @Misc{not-to-toggle,
-  title = {To Toggle, or not to Toggle: The End of Torbutton},
-  author={Mike Perry},
-  note = {\url{https://lists.torproject.org/pipermail/tor-talk/2011-April/020077.html}}
+   title = {To Toggle, or not to Toggle: The End of Torbutton},
+   author={Mike Perry},
+   note = {\url{https://lists.torproject.org/pipermail/tor-talk/2011-April/020077.html}}
 }
 
 @Misc{firefox-personas,

Modified: projects/articles/browser-privacy/W3CIdentity.tex
===================================================================
--- projects/articles/browser-privacy/W3CIdentity.tex	2011-04-27 06:11:22 UTC (rev 24683)
+++ projects/articles/browser-privacy/W3CIdentity.tex	2011-04-27 06:57:24 UTC (rev 24684)
@@ -72,17 +72,16 @@
 web actually functions with respect to user tracking.
 
 To this end, the rest of this document is structured as follows: First, we
-examine how users perceive their privacy on the web, comparing the average
-user's perspective to what actually is happening technically behind the
-scenes, and noting the major disconnects. We then examine solutions that
-bridge this disconnect from two different directions, corresponding to the two
-major sources of disconnect\footnotemark.  The first direction is improving
-user cues and browser interface to suggest a coherent concept of identity to
-users by accurately reflecting the set of unique identifiers they have
-accumulated. The second direction is improving the linkability issues
-inherent with the multi-origin model of the web itself.  Both of these
-directions must be pursued to provide users with the ability to properly use
-the web in a privacy-preserving way.
+compare the average user's understanding of web tracking to what actually is
+happening technically behind the scenes, and note the major disconnects. We
+then examine solutions that bridge this disconnect from two different
+directions, corresponding to the two major sources of disconnect\footnotemark.
+The first direction is improving user cues and browser interface to suggest a
+coherent concept of identity to users by accurately reflecting the set of
+unique identifiers they have accumulated. The second direction is improving
+the linkability issues inherent in the multi-origin model of the web itself.
+Both of these directions must be pursued to provide users with the ability to
+properly use the web in a privacy-preserving way.
 
 \footnotetext{We only consider implementations that involve privacy-by-design.
 Privacy-by-policy approaches such as Do Not Track will not be discussed.}
@@ -159,17 +158,15 @@
 when it comes to user identity and private browsing, but they are not the
 whole story.
 
-Next, we have long-term properties of the browser itself. These include the
-User Agent string, the list of installed plugins, rendering capabilities,
-window decoration size, and browser widget size.
-
-Then, we have properties of the computer. These include desktop size, IP
+Next, we have long-term properties of the browser and the computer. These
+include the User Agent string, the list of installed plugins, rendering
+capabilities, window decoration size, browser widget size, desktop size, IP
 address, clock offset and timezone, and installed fonts.
 
 Finally, linkability also includes the properties of the multi-origin model of
-the web that allow tracking due to partnerships. These include the implicit
-cookie transmission model, and also explicit click referral and data exchange
-partnerships.
+the web that allow tracking due to partnerships and ubiquitous third-party
+content elements. These include the implicit cookie transmission model, and
+also explicit click referral and data exchange partnerships.
 
 \subsection{Developing a Threat Model}
 
@@ -208,7 +205,7 @@
 For users to have privacy, and for private browsing modes to function, the
 relationship between a user and a site must be understood by that user.
 
-Users experience disconnects with the technical realities of the web on two
+Users experience disconnect with the technical realities of the web on two
 major fronts: the average user is not given a clear concept of browser
 identity to grasp the privacy implications of the union of the linkable
 components of her browser, nor does she grasp the privacy implications of the
@@ -221,26 +218,26 @@
 \subsection{Conveying Identity to the User}
 
 The first major disconnect that prevents users from achieving true
-privacy-by-design is that the user interface of most browsers does not provide
-any clearly visible cues to the user to indicate that their current set of
-accumulated linkable state comprise a single, trackable web identity.
+privacy-by-design is that most browsers do not provide any cues to the user to
+indicate that their current set of accumulated linkable state comprise a
+single, trackable web identity that can be changed or cleared.
 
 We believe that the user interface of the browser should convey a sense of
 persistent identity prominently to the user in the form of a visual cue. This
 cue can either be an abstract image, graphic or theme (such as the user's
 choice of Firefox Persona~\cite{firefox-personas}), or it can be a text area
-with the user's current favored pseudonym. This idea of identity should then
-be integrated with the browsing experience. Users should be able to click a
+with the user's current pseudonym. This idea of identity should then be
+integrated with the browsing experience. Users should be able to click a
 button to get a clean slate for a new identity, and should be able to log into
-and out of password-protected stored identities, which would
-contain the entire state of the browser.
+and out of password-protected stored identities, which would contain the
+entire state of the browser.
 
 To this user, the Private Browsing Mode would be no more than a special case
 of this identity UI---a special identity that they can trust not to store
 browsing history information to disk. Such a UI also more explicitly captures
 what is going on with respect to the user's relationship to the web.
-The Tor Project is heading in this direction with the Tor Browser
-Bundle~\cite{not-to-toggle}.
+%The Tor Project is heading in this direction with the Tor Browser
+%Bundle~\cite{not-to-toggle}.
 
 Of the major private browsing modes, Google Chrome's Incognito Mode comes the
 closest to conveying this idea of ``identity'' to the user, and its
@@ -262,10 +259,10 @@
 Unfortunately, all current private browsing modes protect only against
 adversaries with access to the local computer and fail to deal with
 linkability against network adversaries (such as advertising
-networks)~\cite{private-browsing}, claiming that it is outside their threat
-model\footnotemark. If the user is given a new identity that is still linkable
-to the previous one due to shortcomings of the browser, the approach has
-failed as a privacy measure.
+networks)~\cite{private-browsing}, claiming that the latter is outside their
+threat model\footnotemark. If the user is given a new identity that is still
+linkable to the previous one due to shortcomings of the browser, the approach
+has failed as a privacy measure.
 
 \footnotetext{The primary reason given to abstain from addressing a network
 adversary is IP-address linkability. However, we believe this argument to be a red
@@ -311,7 +308,7 @@
 to make linkability less implicit and more consent-driven without the need for
 cumbersome interventionist user interface, and with minimal damage to existing
 content. Where explicit identifiers exist, they should be tied to the pair of
-the top-level origin and the third-party content origin. Where linkability
+the top-level origin and the third-party element origin. Where linkability
 attributes exist, they can be obfuscated on a per-origin basis.
 
 The work done by the Stanford Applied Crypto Group shows that it is relatively
@@ -338,7 +335,7 @@
 would only be transmitted if they match both the top-level origin and the
 third-party origin involved in their creation. Dan observed minimal breakage
 to popular sites, and where breakage did occur, alternative approaches that
-did not violate the new model were readily available to web designers and
+do not violate the new model were readily available to web designers and
 often already in use.
 
 Similarly, this two-level dual-keyed origin isolation can be deployed to
@@ -352,11 +349,11 @@
 intuitive control over site identifiers, and thus with more control over their
 actual relationship to particular sites. For example, the privacy settings
 window could have a user-intuitive way of representing the user's relationship
-with different origins, perhaps by using only the `favicon' of that top level
-origin to represent all of the browser state accumulated by that origin. The
-user could delete the entire set of browser state (cookies, cache, storage,
-cryptographic tokens) associated with a site simply by removing its favicon
-from her privacy info panel.
+with different top-level origins, perhaps by using only the `favicon' of that
+top-level origin to represent all of the browser state accumulated by that
+origin. The user could delete the entire set of browser state (cookies, cache,
+storage, cryptographic tokens) associated with a site simply by removing its
+favicon from her privacy info panel.
 
 Linkability based on fingerprintable browser properties is also amenable to
 improvement under this model. In particular, one can imagine per-origin plugin



More information about the tor-commits mailing list