You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now we have some limits which prevent reporting origins from colluding to leak more combined data, but none of them explicitly target the browsing history reconstruction attack.
To that end, we should consider some mitigations in the form of new rate limits. One proposal here is to add the following limits:
X unique destinations per (source site, m minutes)
Y < X unique destinations per (source site, reporting origin, m minutes). This backstop limit prevents one origin from using up the entire (1) budget.
As with all of our rate limits that operate across reporting origins, same origin policy and our principle of reporting origin control are traded off for privacy. These limits will make it difficult for a set of reporting origins to collude to "query" a large domain of possible sites to see if the user will ever visit them.
The text was updated successfully, but these errors were encountered:
Right now we have some limits which prevent reporting origins from colluding to leak more combined data, but none of them explicitly target the browsing history reconstruction attack.
To that end, we should consider some mitigations in the form of new rate limits. One proposal here is to add the following limits:
As with all of our rate limits that operate across reporting origins, same origin policy and our principle of reporting origin control are traded off for privacy. These limits will make it difficult for a set of reporting origins to collude to "query" a large domain of possible sites to see if the user will ever visit them.
The text was updated successfully, but these errors were encountered: