Delivery-Date: Mon, 31 Aug 2015 05:01:29 -0400
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED,
	T_RP_MATCHES_RCVD autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id 184571E068E;
	Mon, 31 Aug 2015 05:01:27 -0400 (EDT)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id 53E873782A;
	Mon, 31 Aug 2015 09:01:22 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 5B2003782D
 for <tor-talk@lists.torproject.org>; Mon, 31 Aug 2015 09:01:19 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id q6VMk3H60HOZ for <tor-talk@lists.torproject.org>;
 Mon, 31 Aug 2015 09:01:19 +0000 (UTC)
Received: from bilestoad.getfoxyproxy.org (bilestoad.getfoxyproxy.org
 [162.243.99.25])
 by eugeni.torproject.org (Postfix) with ESMTP id 3BFC337822
 for <tor-talk@lists.torproject.org>; Mon, 31 Aug 2015 09:01:19 +0000 (UTC)
Received: from www.example.com (torproxy02.31173.se [185.65.135.227])
 by bilestoad.getfoxyproxy.org (Postfix) with ESMTPSA id E0C7A132DFC
 for <tor-talk@lists.torproject.org>; Mon, 31 Aug 2015 09:01:15 +0000 (UTC)
Message-ID: <55E417CF.6070305@torproject.org>
Date: Mon, 31 Aug 2015 09:01:03 +0000
From: Georg Koppen <gk@torproject.org>
MIME-Version: 1.0
To: tor-talk@lists.torproject.org
References: <20150828230041.747D340496@smtp03.mail.de>
 <20150829020151.GG5822@torproject.org> <55E1163E.3050506@freedom.press>
 <20150829030517.GH5822@torproject.org>
In-Reply-To: <20150829030517.GH5822@torproject.org>
Subject: Re: [tor-talk] Privacy Badger
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2669166849023445159=="
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2669166849023445159==
Content-Type: multipart/signed; micalg=pgp-sha512;
 protocol="application/pgp-signature";
 boundary="Eslt6l2Ke1QtSDp9gsBS9HkPoLSiKB05R"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--Eslt6l2Ke1QtSDp9gsBS9HkPoLSiKB05R
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Mike Perry:

[snip]

> I'm now actually curious if these types of filter addons aren't already=

> being exploited for these and related weaknesses/shortcomings.
>=20
> If any academics are interested in a good publication (Gunes Acar - are=

> you listening? :), it would be *very* interesting to run a crawl to see=

> if any websites have begun to behave adversarially against addons like
> Adblock, Privacy Badger, Ghostery, etc. After all, it is easy for sites=

> to determine if an adblocker has blocked an ad load, and then proceed t=
o
> load an ad from an alternate URL, domain name, or even another ad
> network that may not be covered by the default filters.

https://nta.mpi-sws.org/test2/test.html has a demo to use the AliasMatch
directive to force ad blockers to block whole domains which could be
problematic (In: Akkus/Weaver: The Case for a General and
Interaction-based Third-party Cookie Policy. W2SP 2015). Might be
interesting to see how susceptible current ad blockers are to this
simple trick.

[snip]

Georg


--Eslt6l2Ke1QtSDp9gsBS9HkPoLSiKB05R
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=MR5U
-----END PGP SIGNATURE-----

--Eslt6l2Ke1QtSDp9gsBS9HkPoLSiKB05R--

--===============2669166849023445159==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

--===============2669166849023445159==--

