Seeing as I'm not getting any traction in the fediverse (<a href="https://tenforward.social/@aspensmonster/113999217587309328" rel="nofollow">https://tenforward.social/@aspensmonster/113999217587309328</a>), maybe I can ask here instead.<p>=================================<p>From their blog:<p>>As standardized in [2 - 4], the Privacy Pass protocol is able to accommodate many “architectures.” Our deployment model follows the original architecture presented by Davidson et al. [1], called “Shared Origin, Attester, Issuer” in § 4 of [2].<p>From [2] RFC 9576 § 3.3 "Privacy Goals and Threat Model" :<p>>Clients explicitly trust Attesters to perform attestation correctly and in a way that does not violate their privacy. In particular, this means that Attesters that may be privy to private information about Clients are trusted to not disclose this information to non-colluding parties. Colluding parties are assumed to have access to the same information; see Section 4 for more about different deployment models and non-collusion assumptions. However, Clients assume that Issuers and Origins are malicious.<p>And From [2] RFC 9576 § 4.1 "Shared Origin, Attester, Issuer" :<p>>As a result, attestation mechanisms that can uniquely identify a Client, e.g., requiring that Clients authenticate with some type of application-layer account, are not appropriate, as they could lead to unlinkability violations.<p>Womp womp :(<p>This is not genuinely private in any meaningful sense of the term. Kagi plays the role of all three parties, and even relies on the very thing section 4.1 says is not appropriate: to use mechanisms that can uniquely identify a client. They utilize a client's session token: "In the case of Kagi’s users, this can be done by presenting their Kagi session cookie to the server."<p>Frankly, that blog post is disingenuous at best, and malicious at worst.<p>=================================<p>I <i>want</i> to be wrong here. Where am I wrong? What am I missing?