TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Cname-based tracking increasingly used to bypass browsers’ antitracking defenses

10 pointsby afrcncabout 4 years ago

1 comment

milesabout 4 years ago
FTA:<p>&gt; And because most anti-tracking works on the principle of filter lists, the CNAME cloaking scheme effectively renders most browsers’ anti-tracking defenses ineffective, he notes.<p>&gt; “As of today, from the major web browser vendors only Firefox offers defenses. Since uBlock version 1.25 under Firefox, the extension dynamically resolves hosts and sanitizes such requests if a match is found. Such a measure does not work under Chrome because this web browser does not offer a way for extensions to dynamically resolve hostnames.”<p>I assume he meant uBlock Origin (rather than uBlock) as it introduced uncloaking of CNAME requests as of version 1.25.0 for Firefox: <a href="https:&#x2F;&#x2F;github.com&#x2F;gorhill&#x2F;uBlock&#x2F;releases&#x2F;tag&#x2F;1.25.0" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;gorhill&#x2F;uBlock&#x2F;releases&#x2F;tag&#x2F;1.25.0</a> .