[tor-commits] [tor-browser-spec/master] Clarify the identifier unlinkability section.
mikeperry at torproject.org
mikeperry at torproject.org
Tue May 5 04:18:11 UTC 2015
commit 3d07e2d54d2944bd182145908399bc01c7bbe791
Author: Mike Perry <mikeperry-git at torproject.org>
Date: Mon May 4 21:14:02 2015 -0700
Clarify the identifier unlinkability section.
---
design-doc/design.xml | 32 ++++++++++++++++++++++----------
1 file changed, 22 insertions(+), 10 deletions(-)
diff --git a/design-doc/design.xml b/design-doc/design.xml
index fbec073..88f6426 100644
--- a/design-doc/design.xml
+++ b/design-doc/design.xml
@@ -1112,16 +1112,14 @@ $HOME environment variable to be the TBB extraction directory.
<title>Cross-Origin Identifier Unlinkability</title>
<para>
-The Tor Browser MUST prevent a user's activity on one site from being linked
-to their activity on another site. When this goal cannot yet be met with an
-existing web technology, that technology or functionality is disabled. Our
-<link linkend="privacy">design goal</link> is to ultimately eliminate the need to disable arbitrary
-technologies, and instead simply alter them in ways that allows them to
-function in a backwards-compatible way while avoiding linkability. Users
-should be able to use federated login of various kinds to explicitly inform
-sites who they are, but that information should not transparently allow a
-third party to record their activity from site to site without their prior
-consent.
+The Cross-Origin Identifier Unlinkability design requirement is satisfied
+through first party isolation of all browser identifier sources. First party
+isolation means that all identifier sources and browser state are scoped
+(isolated) using the the URL bar domain. This scoping is performed in
+combination with any additional third party scope. When first party isolation
+is used with explicit identifier storage that already has a constrained third
+party scope (such as cookies, DOM storage, and cache), this approach is
+referred to as "double-keying".
</para>
<para>
@@ -1152,6 +1150,19 @@ form history, login values, and so on within a context menu for each site.
</caption>
</figure>
+
+ <sect3>
+ <title>Identifier Unlinkability Defenses in the Tor Browser</title>
+ <para>
+
+Unfortunately, many aspects of browser state can serve as identifier storage,
+and no other browser vendor or standards body has invested the effort to
+enumerate or otherwise deal with these vectors for third party tracking. As
+such, we have had to enumerate and isolate these identifier sources on a
+piecemeal basis. Here is the list that we have discovered and dealt with to
+date:
+
+ </para>
<orderedlist>
<listitem>Cookies
<para><command>Design Goal:</command>
@@ -1430,6 +1441,7 @@ Identity</command> invocations.
For more details on identifier linkability bugs and enhancements, see the <ulink
url="https://trac.torproject.org/projects/tor/query?keywords=~tbb-linkability&status=!closed">tbb-linkability tag in our bugtracker</ulink>
</para>
+ </sect3>
</sect2>
<sect2 id="fingerprinting-linkability">
<title>Cross-Origin Fingerprinting Unlinkability</title>
More information about the tor-commits
mailing list