{"id":13429,"date":"2017-11-11T17:33:19","date_gmt":"2017-11-12T01:33:19","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=13429"},"modified":"2017-11-20T14:26:09","modified_gmt":"2017-11-20T22:26:09","slug":"sb-12-11-2017","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2017\/11\/sb-12-11-2017\/","title":{"rendered":"Security Bits &#8211; Canvas Fingerprinting, KRACK Updates, TOR Browser Bug, New Zero-Day WiFi Bug, Brother Printer Exploit"},"content":{"rendered":"<h3>Security Medium 1 \u2014 Canvas Fingerprinting<\/h3>\n<p>Before we look at canvas finger printing, I just want to set the scene with a reminder of one of the most fundamental truths about how the web was designed \u2013 each web page load is an independent event. Because that meant websites had no memory of anything that went before, i.e. no concept of <em>state<\/em> the original web could not cope with concepts like logging in, or shopping baskets. Something had to be bolted on to allow web servers connect individual requests into related groups of requests.<\/p>\n<p>The official mechanism added to the HTTP protocol for retaining state between requests is the humble cookie. Cookies gave us the ability to log in, and basically, the modern web. But, they came with a dark side \u2014 as well as enabling all the cool things we like about the modern web, they also enabled tracking.<\/p>\n<p><!--more--><\/p>\n<p>Because cookies are a well defined and well documented feature, browsers provide users with mechanisms for controlling their use. That\u2019s a threat to the bottom line of those who make money by tracking people against their will and selling the information they glean from that tracking. That\u2019s why the trackers have always tried to think outside the box and find un-official and hence hard to block mechanisms for tracking users.<\/p>\n<p>One of the approaches used is <em>fingerprinting<\/em>. The idea is to figure out some kind of calculation or processing you can do with either the metadata included in HTTP headers the data accessible via the JavaScript APIs to generate a result that\u2019s very unique, and doesn\u2019t change over time.<\/p>\n<p>A really naive finger print might be to combine the list of installed fonts with the browser version, screen resolution, and OS version and then hash that down to a single 28bit value. That\u2019s not completely unique, but it\u2019s pretty unique, and it\u2019s not very long lived (you update your browser and OS right!), but it\u2019s still going to remain static for days or even weeks. This kind of finger print can be used for some imperfect, but still financially valuable tracking.<\/p>\n<p>Needless to say, the multi-billion-dollar tracking industry didn\u2019t stop with naive fingerprints, they kept, and indeed keep, looking for better finger prints. That\u2019s where the HTML5 canvas comes in.<\/p>\n<p>I\u2019d argue that the humble HTML 5 canvas is probably the single biggest reason Flash is dead! So what is it? It\u2019s an HTML tag that allows developers to define a rectangular area on a web page that they can write pixel information to. Basically, it\u2019s a canvas you can draw on programatically. Make that pixel pink, draw a blue square with one corner at one coordinate and the other at another, and so on. Basically, the HTML 5 canvas made it possible to write graphical games on the web without Flash.<\/p>\n<p>That doesn\u2019t sound like it has anything what so ever to do with tracking does it!?<\/p>\n<p>What some very clever people noticed though is that while the same code creates a picture that looks extremely similar on every computer, the pixels on canvases have teeny tiny subtle variations, and those variations are determined by the computer rendering them, and consistent over time. My computer will draw a canvas a tiny bit differently to yours, and that difference will stay the same over time. Bingo \u2014 tracking!<\/p>\n<p>How can \u201cmake this pixel pink\u201d result in different outputs on different computer? That simple example can\u2019t, but the canvas supports much higher-level drawing operations, like support for anti-aliasing, and shape and font rendering. Each browser has its own implementation of the canvas tag, so they\u2019ll make subtly different choices on things like which anti-aliasing algorithm to use. Worse still, browsers hand a lot of graphics tasks off to the graphics card, so different hardware will also result in subtle differences in renderings. So even if two computers have the same browser version on the same OS version, if they have different graphics cards the anti-aliasing on a letter or a shape is likely to be very subtly different.<\/p>\n<p>I have to stress that these differences are REALLY subtle. You\u2019d need to zoom right in to a few 100% and compare pixel by pixel to notice these changes, but computers deal in absolutes, so different is different!<\/p>\n<p>The way this works is that a small piece of JavaScript creates a small canvas and positions it off screen so you don\u2019t see it. It then renders some carefully chosen shapes or letters to that canvas, and reads back the exact value of every resulting pixel, and hashes that result. The shapes are carefully chosen to be as likely as possible to be rendered differently from browser to browser and computer to computer.<\/p>\n<p>Remember that a small change in input to a hash should produce a big change in output. So, by hashing small subtle difference our eyes can\u2019t see, you get massively different outputs.<\/p>\n<p>It\u2019s these hashes that are the canvas fingerprint, and, they vary a lot from computer to computer, and they stay static over long periods of time, so they make great trackers.<\/p>\n<p>So, what made the news this week is that FireFox 58 is following the TOR Browser\u2019s lead, and blocking canvas fingerprints \u2014 how?<\/p>\n<p>Simple \u2014 if some JavaScript code calls the function to read pixel value from a canvas that is not visible on screen, the browser will ask the user\u2019s permission before proceeding.<\/p>\n<p>Right now this second only the TOR browser does this, FireFox will do it when version 58 releases, but for now, I\u2019m not aware that the other browser manufacturers have committed to doing this too. Hopefully they will, and soon.<\/p>\n<h4>Links:<\/h4>\n<ul>\n<li>A fantastic explanation of all this, with very helpful illustrations \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/30\/firefox-takes-a-bite-out-of-the-canvas-super-cookie\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable Security Updates<\/h3>\n<ul>\n<li>Apple patch pretty much everything (including fixes for the KRACK Wifi vulnerabilities)\n<ul>\n<li>iOS 11.1 \u2014 <a href=\"https:\/\/www.macobserver.com\/news\/product-news\/apple-ios-11-1-new-emojis-krack-fix\/\">www.macobserver.com\/\u2026<\/a><\/li>\n<li>macOS High Sierra 10.13.1, Security Update 2017\u2013001 for macOS Sierra &amp; Security Update 2017\u2013004 for MacOS X El Capitan \u2014 <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-10-13-1-high-sierra-ios-11-1-with-security-fixes\/\">www.intego.com\/\u2026<\/a><\/li>\n<li>watchOS 4.1 \u2014 <a href=\"http:\/\/tidbits.com\/article\/17605\">tidbits.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>The TOR Browser was patched to fix the so-called <em>TorMoil<\/em> bug which leaked IP addresses (utterly defeating the purpose of TOR) \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/06\/hole-in-tor-causes-tormoil-update-now\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Notable News<\/h3>\n<ul>\n<li>While Apple have patched for KRACK, a new zero-day Wifi bug has been found in pre-iPhone7 models of iPhone. The bug was found at the <em>Pwn2Own<\/em> hacking contest, and in keeping with that competition\u2019s rules, the details have been passed to Apple, but will not be made public until Apple have had 90 days to get a patch out. Keep your eye out for another iOS update soon \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/02\/iphones-get-a-krack-patch-and-a-wi-fi-0-day-on-the-same-day\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Facebook have begun trialing a new system to allow users to submit images for blocking on Facebook. The idea is that you securely upload the image of you that you want blocked, Facebook review it to make sure it really is an image of you, then they take a fingerprint of it, and delete it. From then on, no image matching that fingerprint can be uploaded to Facebook \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/06\/facebook-upload-your-nudes-to-stop-revenge-porn\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>Brother printers hit by zero-day denial of service exploit \u2014 <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/11\/simple-exploit-can-be-used-to-brick-brother-printers-remotely\/\">nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<h3>Suggested Reading<\/h3>\n<ul>\n<li>PSAs, Tips &amp; Advice\n<ul>\n<li><a href=\"https:\/\/www.imore.com\/how-manage-privacy-and-security-settings-safari-iphone-and-ipad\">How to manage privacy and security settings in Safari on iPhone and iPad \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/tips\/how-to\/ios-11-enable-private-notifications-dissuade-prying-eyes\/\">iOS 11: Enable Private Notifications to Dissuade Prying Eyes \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/limitations-face-id-what-you-need-know\">The limitations of Face ID: What you need to know \u2014 www.imore.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Notable Breaches &amp; Privacy Violations\n<ul>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/2nd-breach-at-verticalscope-impacts-25m\/\">2nd Breach at Verticalscope Impacts Millions \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>News\n<ul>\n<li>\u2b50\ufe0f (US) <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/03\/senators-act-to-save-voting-machines\/\">Senators act to SAVE voting machines \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li>The US Government\u2019s fight against Encryption continues:\n<ul>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/01\/us-government-wants-keys-under-doormat-approach-to-encryption\/\">US government wants \u201ckeys under doormat\u201d approach to encryption \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2017\/11\/fbi-cant-break-the-encryption-on-texas-shooters-smartphone\/\">FBI can\u2019t break the encryption on Texas shooter\u2019s smartphone \u2014 arstechnica.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/columns-opinions\/the-back-page\/right-cue-doj-says-encryption-surely-costs-lives\/\">Right On Cue, DOJ Says Encryption \u2018Surely Costs Lives\u2019 \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/columns-opinions\/the-back-page\/texas-shooting-privacy-encryption\/\">Texas Shooting Massacre Revives False Dichotomy over Privacy and Encryption \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/31\/london-heathrow-airports-security-laid-bare-by-one-lost-usb-stick\/\">London Heathrow Airport\u2019s security laid bare by one lost USB stick \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/01\/now-anyone-can-fool-recaptcha\/\">Now anyone can fool reCAPTCHA \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2017\/11\/equifax-reopens-salary-lookup-service\/\">Equifax Reopens Salary Lookup Service \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/06\/meet-russian-twitter-troll-jenna-abrams-and-her-2752-friends\/\">Meet Russian Twitter troll Jenna Abrams and her 2,752 friends \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Opinion &amp; Analysis\n<ul>\n<li>\u2b50\ufe0f <a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-october-2017\/\">Month in Review: Apple Security in October 2017 \u2014 www.intego.com\/\u2026<\/a><\/li>\n<li>\u2b50\ufe0f <a href=\"http:\/\/tidbits.com\/article\/17621\">Face ID\u2019s Innovation: Continuous Authentication \u2014 tidbits.com\/\u2026<\/a><\/li>\n<li>\u2b50\ufe0f <a href=\"http:\/\/social.techcrunch.com\/2017\/11\/04\/a-closer-look-at-the-capabilities-and-risks-of-iphone-x-face-mapping\/\">A closer look at the capabilities and risks of iPhone X face mapping \u2014 social.techcrunch.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.imore.com\/face-id-sibling-fud\">No, siblings aren\u2019t \u2018fooling\u2019 Face ID \u2014\u00a0they\u2019re training it \u2014 www.imore.com\/\u2026<\/a><\/li>\n<li>\u2b50\ufe0f <a href=\"https:\/\/qz.com\/1115353\/new-research-from-nvidia-shows-that-the-era-of-easily-faked-ai-generated-photos-is-quickly-emerging\/\">The era of easily faked, AI-generated photos is quickly emerging \u2014 qz.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/10\/how-twitter-outrage-hatches-in-tiny-fringe-groups-on-4chan-and-reddit\/\">How Twitter outrage hatches in tiny fringe groups on 4chan and Reddit \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/08\/is-the-1-6tb-paradise-papers-expose-a-leak-or-a-hack\/\">Is the 1.6TB Paradise Papers expos\u00e9 a leak or a hack? \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Propellor Beanie Teritory\n<ul>\n<li>\u2b50\ufe0f Microsoft have issued a security advisory on the DDE vulnerabilities we talked about in the previous show, but none of their advice is in any way human-friendly. If you work in IT, then the document is very valuable, and you might consider a group policy to set the various registry keys discussed \u2014 <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/4053440.aspx\">technet.microsoft.com\/\u2026<\/a><\/li>\n<li>\u2b50\ufe0f <a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/10\/what-do-microsofts-highly-secure-windows-10-device-standards-tell-us\/\">What do Microsoft\u2019s highly secure Windows 10 device standards tell us? \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/10\/27\/android-takes-aim-at-isp-surveillance-with-dns-privacy\/\">Android takes aim at ISP surveillance with DNS privacy \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/2017\/10\/fear-the-reaper-or-reaper-madness\/\">Fear the Reaper, or Reaper Madness? \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/nakedsecurity.sophos.com\/2017\/11\/02\/how-to-wear-your-password-on-your-sleeve-literally\/\">How to wear your password on your sleeve, literally \u2014 nakedsecurity.sophos.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.macobserver.com\/columns-opinions\/editorial\/apple-releases-details-differential-privacy-which-emoji-is-most-popular\/\">Apple Releases Details on Differential Privacy, and the Big Takeaway Is Which Emoji Is Most Popular \u2014 www.macobserver.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/ma.ttias.be\/googles-quic-protocol-moving-web-tcp-udp\/\">Google\u2019s QUIC protocol: moving the web from TCP to UDP \u2014 ma.ttias.be\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Palate Cleansers<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.syfy.com\/syfywire\/the-100-megapixel-moon\">The 100 megapixel Moon \u2014 www.syfy.com\/\u2026<\/a><\/li>\n<li>Pat gave Allison a <a href=\"http:\/\/amzn.to\/2ACXnf2\" target=\"_blank\" rel=\"noopener\">&#8220;Box of Boogers&#8221; amzn.to\/&#8230;<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security Medium 1 \u2014 Canvas Fingerprinting Before we look at canvas finger printing, I just want to set the scene with a reminder of one of the most fundamental truths about how the web was designed \u2013 each web page load is an independent event. Because that meant websites had no memory of anything that [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":13191,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147],"tags":[1969,1966,1941,569,1967,1968],"class_list":["post-13429","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","tag-brother-printers","tag-canvas-fingerprinting","tag-krack","tag-security-bits","tag-tor","tag-zero-day"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2017\/10\/security_bits_logo_300px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13429","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=13429"}],"version-history":[{"count":5,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13429\/revisions"}],"predecessor-version":[{"id":13543,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/13429\/revisions\/13543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/13191"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=13429"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=13429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=13429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}