Patrick Shanahan wrote:
* David C. Rankin <drankinatty@suddenlinkmail.com> [11-22-19 11:03]:
My take away was the bad guys have found a way to continue tracking you site-to-site and to fingerprint your browser (tie those browsing activities to you individually) by using DNS to get around the browser setting
so if you do not have static ip address, the data mined is questionable.
No, there's no influence on the value of the tracked data. Trackers are detected by blockers via their name/domain. And blocked, if you want. So if you go to some.interesting.site, and thei try to include tracker code from evil.tracker.com, that is easily blocked. But if some.interestung.site *does* want the tracking, they put an entry in their own DNS server, e.g., cms.interesting.site, that relays to evil.tracker.com. The blocker thinks it belongs to interesting.site, and allows it. So the result is the same as if the blocker had not been active. It looks like FF has some hook that allows checking where the IP address that the DNS query delivers actually points to some host of interesting.site. Such code can detect this trick, but can as well fail on valid crossdirects for companies that have several domains. We'll have to see if the FF solution works without flaws, and when other browsers catch up on this. With Chrome of course the main question is whether 'be evil' Google *wants* to catch up. Recent activity suggests rather not :( -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org