TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Downgrade User Agent Client Hints to 'harmful'

150 pointsby ronancreminalmost 4 years ago

9 comments

Ajedi32almost 4 years ago
&gt; Moving stuff around (from User-Agent to Sec-CH-UA-*) doesn&#x27;t really solve much. That is, having to request this information before getting it doesn&#x27;t help if sites routinely request all of it.<p>I think this is sort of ignoring the whole point of the proposal. By making sites <i>request</i> this information rather than simply always sending it like the User-Agent header currently does, browsers gain the ability to <i>deny</i> excessively intrusive requests when they occur.<p>That is to say, &quot;sites routinely request all of it&quot; is precisely the problem this proposal is intended to solve.<p>There are some good points in this post about things which can be improved with specific Sec-CH-UA headers, but the overall position seems to be based on a failed understanding of the purpose of client hints.
评论 #27822005 未加载
评论 #27823190 未加载
评论 #27821359 未加载
评论 #27821431 未加载
评论 #27822149 未加载
评论 #27825749 未加载
csmpltnalmost 4 years ago
&gt; &quot;User Agents MUST return the empty string for model if mobileness is false. User Agents MUST return the empty string for model even if mobileness is true, except on platforms where the model is typically exposed.&quot; (quoted from <a href="https:&#x2F;&#x2F;wicg.github.io&#x2F;ua-client-hints&#x2F;#user-agent-model" rel="nofollow">https:&#x2F;&#x2F;wicg.github.io&#x2F;ua-client-hints&#x2F;#user-agent-model</a>)<p>Honestly now - who drafts and approves these specs? Not only does it make no sense whatsoever to encode such information this way - it also results in unimaginable amounts of bandwidth going to complete waste, on a planetary scale.<p>This is just plain incompetence. How did we let the technology powering the web devolve into this burning pile of nonsense?
评论 #27822270 未加载
评论 #27828500 未加载
评论 #27830221 未加载
theandrewbaileyalmost 4 years ago
I would rather have all this information (along with whatever is being inferred from them) be exposed through a Javascript API instead of having browsers indiscriminately flood global networks with potential PII.<p>Chrome came up with this? Figures. Stay evil, Google.
评论 #27822165 未加载
评论 #27835932 未加载
评论 #27833434 未加载
admax88qalmost 4 years ago
Serving different content for the same URI based upon various metadata fields in the request goes completely against the spirit of a URI.
评论 #27824939 未加载
评论 #27824189 未加载
justshowpostalmost 4 years ago
&gt; UA Client Hints proposes that information derived from the User Agent header field could only be sent to servers that specifically request that information, specifically to reduce the number of parties that can passively fingerprint users using that information. We find that the addition of new information about the UA, OS, and device to be harmful as it increases the information provided to sites for fingerprinting, without a commensurate improvements in functionality or accountability to justify that. In addition to not including this information, we would prefer freezing the User Agent string and only providing limited information via the proposed NavigatorUAData interface JS APIs. This would also allow us to audit the callers. At this time, freezing the User Agent string without any client hints (which is not this proposal) seems worth prototyping. We look forward to learning from other vendors who implement the &quot;GREASE-like UA Strings&quot; proposal and its effects on site compatibility.<p><a href="https:&#x2F;&#x2F;mozilla.github.io&#x2F;standards-positions&#x2F;#ua-client-hints" rel="nofollow">https:&#x2F;&#x2F;mozilla.github.io&#x2F;standards-positions&#x2F;#ua-client-hin...</a>
jrochkind1almost 4 years ago
I&#x27;m late to the ballgame, but what does &quot;Sec-&quot; mean as a HTTP header prefix anyway? I am failing at googling.
评论 #27823818 未加载
daveoc64almost 4 years ago
I hope they avoid situations like the SameSite=None debacle[0] if they are going to freeze the User Agent header and not provide an alternative.<p>The assertion of Mozilla seems to be:<p>&gt;At the time sites deploy a workaround, they can’t necessarily know what future browser version won’t have the need for the workaround. Can we guarantee only retrospective use? Do Web developers care enough about retrospective workarounds for evergreen browsers?<p>When there are significant numbers of users on devices like iPads that don&#x27;t get updated any more, you can&#x27;t rely on &quot;evergreen browsers&quot;.<p>[0] - <a href="https:&#x2F;&#x2F;www.chromium.org&#x2F;updates&#x2F;same-site&#x2F;incompatible-clients" rel="nofollow">https:&#x2F;&#x2F;www.chromium.org&#x2F;updates&#x2F;same-site&#x2F;incompatible-clie...</a>
fnord77almost 4 years ago
&gt; Sec-CH-UA-Model provides a lot of identifying bits on Android and leads...<p>intentional?
评论 #27824134 未加载
dmitriidalmost 4 years ago
&gt; I&#x27;m not sure why you used such an old Chrome version to test this.<p>That quote from the first comment on the issue is just a cherry on top.<p>Chrome 88 was released in December 2020. 7 months ago.
评论 #27822508 未加载
评论 #27823731 未加载