Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix #37: Add cross-origin leaks, hijacking browsing history #38

Merged
merged 1 commit into from
Sep 4, 2017
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions index.bs
Original file line number Diff line number Diff line change
Expand Up @@ -95,6 +95,13 @@ the device environment. Potential privacy risks include:
- Cross-device communication. A simple broadcast communication method can
use device screen or camera LED flashes to broadcast messages read
out with an Ambient Light Sensor in a close by device.
- Cross-origin leaks. Light emitted from the screen can be reflected back to
the sensor from nearby reflective surfaces. Malicious sites can embed
resources from different origins and scale the content to display
particular pixels to allow distinguish the contents, pixel by pixel.
- Hijacking browsing history. Styling visited links to allow distinguish the
light levels associated with visited and unvisited links i.e. visited
links styled as a block of black screen; white for unvisited.

To mitigate these Ambient Light Sensor specific threats, user agents should
use one or both of the following mitigation strategies:
Expand Down
11 changes: 10 additions & 1 deletion index.html
Original file line number Diff line number Diff line change
Expand Up @@ -1431,7 +1431,7 @@
<div class="head">
<p data-fill-with="logo"><a class="logo" href="https://www.w3.org/"> <img alt="W3C" height="48" src="https://www.w3.org/StyleSheets/TR/2016/logos/W3C" width="72"> </a> </p>
<h1 class="p-name no-ref" id="title">Ambient Light Sensor</h1>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2017-08-21">21 August 2017</time></span></h2>
<h2 class="no-num no-toc no-ref heading settled" id="subtitle"><span class="content">Editor’s Draft, <time class="dt-updated" datetime="2017-08-29">29 August 2017</time></span></h2>
<div data-fill-with="spec-metadata">
<dl>
<dt>This version:
Expand Down Expand Up @@ -1570,6 +1570,15 @@ <h2 class="heading settled" data-level="3" id="security-and-privacy"><span class
<p>Cross-device communication. A simple broadcast communication method can
use device screen or camera LED flashes to broadcast messages read
out with an Ambient Light Sensor in a close by device.</p>
<li data-md="">
<p>Cross-origin leaks. Light emitted from the screen can be reflected back to
the sensor from nearby reflective surfaces. Malicious sites can embed
resources from different origins and scale the content to display
particular pixels to allow distinguish the contents, pixel by pixel.</p>
<li data-md="">
<p>Hijacking browsing history. Styling visited links to allow distinguish the
light levels associated with visited and unvisited links i.e. visited
links styled as a block of black screen; white for unvisited.</p>
</ul>
<p>To mitigate these Ambient Light Sensor specific threats, user agents should
use one or both of the following mitigation strategies:</p>
Expand Down