Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Escaping the Privacy Sandbox with Client Side Deanonymization Attacks

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore client-side deanonymization attacks that can compromise user privacy within Google's Privacy Sandbox initiative in this 26-minute DEF CON 33 conference talk. Examine how new web APIs designed as privacy-preserving alternatives to third-party cookies contain exploitable vulnerabilities and misconfigurations that can be leveraged to breach user anonymity. Learn about the Attribution Reporting API and discover how debugging reports can bypass privacy mechanisms like Referrer-Policy to potentially expose sensitive user information. Understand destination hijacking techniques combined with side-channel attacks using storage limit oracles to reconstruct browsing history, demonstrating sophisticated deanonymization methods. Investigate vulnerabilities in the Shared Storage API and see how insecure cross-site worklet code can leak data stored within Shared Storage, despite the API's deliberate design to prevent direct data access. Gain insights through real-world examples and potential attack scenarios that highlight the practical implications of these security vulnerabilities in privacy-focused web technologies.

Syllabus

DEF CON 33 - Escaping the Privacy Sandbox with Client Side Deanonymization Attacks - Eugene Lim

Taught by

DEFCONConference

Reviews

Start your review of Escaping the Privacy Sandbox with Client Side Deanonymization Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.