TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Preventing Pool-Party Attacks

114 pointsby decryptover 3 years ago

7 comments

ljhsiungover 3 years ago
I did some digging. To me it was rather unclear about the impact of this. Furthermore, it definitely just feels like a recategorization&#x2F;relabelling on Brave&#x27;s part to get some brownie points. Not that it&#x27;s not interesting, but I feel it&#x27;s just a new name but old concept.<p>This [0] is a 1 year old referenced wiki page in the article, which itself is a reference to a 3 year old Chromium bug [1].<p>The issue is, as some commenters mentioned, one process in another tab hogging all the sockets can make determine the timing on a new socket that is requested.<p>If the socket&#x27;s timing is data dependent, then you can infer what the data is.<p>That&#x27;s basically XS-search attacks [2]. [1] uses the example of &#x27;<a href="https:&#x2F;&#x2F;mail.yahoo.com&#x2F;d&#x2F;search&#x2F;keyword=" rel="nofollow">https:&#x2F;&#x2F;mail.yahoo.com&#x2F;d&#x2F;search&#x2F;keyword=</a>&#x27;, where the keyword &quot;Amazon Purchase&quot; consumes a socket and takes a longer amount of time due to our socket hogging vs. if we didn&#x27;t hog it. This timing dependency lets us know across tabs that the victim buys stuff off Amazon.<p>In some cases, you can deterministically force the victim to execute this search query, and thus, the side channel.<p>[0]: <a href="https:&#x2F;&#x2F;xsleaks.dev&#x2F;docs&#x2F;attacks&#x2F;timing-attacks&#x2F;connection-pool&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xsleaks.dev&#x2F;docs&#x2F;attacks&#x2F;timing-attacks&#x2F;connection-p...</a><p>[1]: <a href="https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=843157" rel="nofollow">https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;chromium&#x2F;issues&#x2F;detail?id=843157</a><p>[2]: <a href="https:&#x2F;&#x2F;xsleaks.dev&#x2F;" rel="nofollow">https:&#x2F;&#x2F;xsleaks.dev&#x2F;</a>
评论 #29576817 未加载
mlinksvaover 3 years ago
The linked <a href="https:&#x2F;&#x2F;privacytests.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;privacytests.org&#x2F;</a> looks like a really useful aggregation&#x2F;rundown&#x2F;testing of privacy protecting features across browsers.
zaltekkover 3 years ago
Here&#x27;s the paper: <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;2112.06324.pdf" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;2112.06324.pdf</a>
评论 #29570392 未加载
akerstenover 3 years ago
It&#x27;s unclear- do these attacks require you to have the hostile site(s) open simultaneously in both private and non-private tabs?<p>Seems like it would, for the resources to stay allocated. If that&#x27;s the case, it&#x27;s kind of a &quot;hm, neat, fix the partitioning&quot; to me rather than something that needs its own name and hoopla.
评论 #29571332 未加载
annoyingnoobover 3 years ago
Don&#x27;t forget that Brave is the product of an advertising network and their goal is to increase use of Brave to push more ads.
评论 #29571516 未加载
评论 #29571047 未加载
评论 #29571093 未加载
nojsover 3 years ago
I’m trying to understand the problem here. If the website you’re on has some javascript that’s executing side channel attacks to uniquely identify you, why couldn’t they just use other fingerprinting techniques?
评论 #29570974 未加载
评论 #29570625 未加载
namelessoracleover 3 years ago
Is it bad that I thought at first from the title it was referring to the reports a few years ago of gangs attacking rival gang members at the local pool? (sense its a location they are presumably off guard and wouldnt have access to weapons to defend themself)
评论 #29571245 未加载
评论 #29571287 未加载