The truth about Safari privacy: Tracking even in incognito mode

While Safari is known as a safe browser for iOS users, a recent discovery by developer Mysk has raised concerns about potential user tracking issues in Safari. This article examines the technical details of the vulnerability, its impact on user privacy, and potential solutions to mitigate the risks.

Vulnerability detection in Safari: Track iOS devices even in incognito mode

iPhone Safari

Source: Slashgear

URI Scheme Vulnerability Study

The vulnerability is related to a specific URI scheme used by Safari. URI schemes define how resources are accessed, and in this case they allow unauthorized app stores to be installed from websites. Safari's behavior inadvertently opens the door for attackers to use this vulnerability to track users.

Even if the website is not a legitimate app store, Safari still attempts to process the URI scheme, allowing attackers to track users through this vulnerability.

Identifying vulnerabilities in client ID and tracking mechanisms

The Mysk demo shows how a simple ten-line code on a website can trigger this vulnerability. When a user visits such a site, Safari initiates an attempt to download the fictitious app store, revealing the user's unique client ID.

Although the download fails due to an authorization error, revealing the client ID can allow the user to be tracked across websites.

The situation becomes even more threatening when elements like “adpURL” and “storeAccountName” come into play. If these elements are compatible, they can potentially facilitate the exchange of customer ID information between websites, consolidating a user's online presence.

Ignoring Incognito Mode: Broken Privacy Shield

One of the most disturbing aspects of this vulnerability is the ability to bypass Safari's incognito mode, which is designed to prevent browsing history and user tracking. Despite incognito mode, this vulnerability can still reveal a customer's identity, undermining the promised privacy protection.

This geo-restricted vulnerability currently only affects iOS devices in the European Union (EU), where Apple is required to allow the use of alternative app stores. Users in other regions have not been affected yet.

Geographic coverage and mitigation strategies

There is a geographic limitation to this vulnerability. It currently only affects iOS devices in the European Union (EU) region. This is due to the fact that Apple is obliged to allow the use of alternative application stores in the EU, which requires the implementation of a special URI scheme in Safari for this region. Users in other regions are currently unaffected.

The easiest mitigation strategy for EU users is to consider using a browser other than Safari. Many alternative browsers for iOS, such as Firefox or Chrome, are known for having more effective anti-tracking mechanisms. These browsers may block attempts to access the vulnerable URI scheme and prevent disclosure of the client ID.

While changing your browser provides immediate protection, it's equally important to raise awareness of this vulnerability and encourage Apple to fix it with a software update. A patch that would change Safari's behavior to only handle the URI scheme for legitimate installs from app stores would effectively close this vulnerability.

Steps beyond mitigation: Protecting user privacy

The discovery of this vulnerability highlights the ongoing battle for user privacy in the digital realm. Even with safeguards like incognito mode, vulnerabilities can remain.

Users should be aware of these potential vulnerabilities and exercise caution when browsing web pages. Here are some additional privacy considerations:

  • Choose sites wisely: Be careful when visiting websites, especially those with questionable content. Do not click on suspicious links or download content from unknown sources.
  • Using privacy extensions: Various privacy extensions are available for iOS browsers that improve tracking protection. These extensions can strengthen user privacy by blocking tracking scripts and cookies.
  • Stay up to date with events: Update your iOS device and browsers regularly to access the latest security patches and vulnerability fixes released by Apple and browser developers.

Safari

Advanced URI Scheme Vulnerability Analysis

  • Understanding the mechanics of the URI scheme: A URI (Uniform Resource Identifier) ​​serves as an address that tells your device how to access a particular resource, and consists of components such as a scheme (eg http, https), a domain name, and a path to it. Vulnerable scheme allows direct installation of app stores from websites.

  • Safari Overzealous Behavior: The vulnerability occurs due to Safari attempting to process the app store installation scheme even on non-legitimate app store websites. This behavior can be used by attackers to initiate a download attempt and reveal the client's identity.

  • Client-ID decoding: Client-ID is a unique identifier assigned to each Apple device. While it serves a legitimate purpose in Apple's ecosystem, its disclosure in this context opens up opportunities for cross-site tracking.

  • Role of “adpURL” and “storeAccountName”: These additional website features, if compatible, may facilitate the exchange of customer IDs between sites. “adpURL” can pass information related to advertising, while “storeAccountName” can refer to a specific app store account. Combined with a customer ID, this data can create a broad profile of a user's online presence.

  • Explanation about bypassing incognito mode: Incognito mode usually prevents browsing history and cookies from being saved to ensure privacy. However, in this case, the disclosure of the client's ID occurs at the network level before the normal browsing history is created, thus bypassing the intended incognito mode to protect privacy.

Results

The discovery of this vulnerability in Safari highlights the need for constant vigilance to protect user privacy. While there are ways to mitigate the effects, the long-term solution depends on whether the company eliminates Apple Lossless Audio CODEC (ALAC), vulnerability through a software update.

By understanding the technical nuances of the vulnerability and taking a comprehensive approach to online privacy protection, users can reduce the risks associated with online tracking and increase the security of their devices.

This incident serves as a reminder to developers and technology companies to carefully prioritize robust security measures. The collaborative efforts of users, developers, and technology companies can contribute to a more secure and privacy-friendly digital landscape.

What's your reaction?
Cool
1
Cool
Happy
0
Happy
Shaking
0
Shaking
Interesting
0
Interesting
Sad
0
Sad
Angry
0
Angry
Read Gizchina on Google News

Did you like the article? Thanks to the editors!

Source
Share with friends
Rate the author
(There are no ratings yet)
GizChina.Com.Ua