{"id":142209,"date":"2022-07-14T20:22:18","date_gmt":"2022-07-15T01:22:18","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2022\/07\/a-new-attack-can-unmask-anonymous-users-on-any-major-browser"},"modified":"2022-07-14T20:22:18","modified_gmt":"2022-07-15T01:22:18","slug":"a-new-attack-can-unmask-anonymous-users-on-any-major-browser","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2022\/07\/a-new-attack-can-unmask-anonymous-users-on-any-major-browser","title":{"rendered":"A New Attack Can Unmask Anonymous Users on Any Major Browser"},"content":{"rendered":"<p style=\"padding-right: 20px\"><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/a-new-attack-can-unmask-anonymous-users-on-any-major-browser3.jpg\"><\/a><\/p>\n<p>When you visit a website, the page can capture your IP address, but this doesn\u2019t necessarily give the site owner enough information to individually identify you. Instead, the hack analyzes subtle features of a potential target\u2019s browser activity to determine whether they are logged into an account for an array of services, from YouTube and Dropbox to Twitter, Facebook, TikTok, and more. Plus the attacks work against every major browser, including the anonymity-focused Tor Browser.<\/p>\n<p>\u201cIf you\u2019re an average internet user, you may not think too much about your privacy when you visit a random website,\u201d says Reza Curtmola, one of the study authors and a computer science professor at NJIT. \u201cBut there are certain categories of internet users who may be more significantly impacted by this, like people who organize and participate in political protest, journalists, and people who network with fellow members of their minority group. And what makes these types of attacks dangerous is they\u2019re very stealthy. You just visit the website and you have no idea that you\u2019ve been exposed.\u201d<\/p>\n<p>The risk that government-backed hackers and cyber-arms dealers will attempt to de-anonymize web users isn\u2019t just theoretical. Researchers have documented a <a href=\"https:\/\/www.wired.com\/story\/ios-macos-hacks-hong-kong-watering-hole\/\">number<\/a> of <a data-offer-url=\"https:\/\/iranthreats.github.io\/resources\/webrtc-deanonymization\/\" class=\"\"  href=\"https:\/\/iranthreats.github.io\/resources\/webrtc-deanonymization\/\" rel=\"nofollow noopener\" target=\"_blank\">techniques<\/a> used in the wild and have witnessed situations in which attackers identified individual users, though it wasn\u2019t clear how.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you visit a website, the page can capture your IP address, but this doesn\u2019t necessarily give the site owner enough information to individually identify you. Instead, the hack analyzes subtle features of a potential target\u2019s browser activity to determine whether they are logged into an account for an array of services, from YouTube and [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,1490,418],"tags":[],"class_list":["post-142209","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-government","category-internet"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/142209","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=142209"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/142209\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=142209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=142209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=142209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}