top | item 12224420

New attack steals SSNs, e-mail addresses, and more from HTTPS pages

86 points| jvannistelrooy | 9 years ago |arstechnica.com | reply

7 comments

order
[+] joveian|9 years ago|reply
Summary: side channel via new APIs Resource Timing and Fetch allow BREACH or CRIME to be implemented via third party cookies. Disabling third party cookies prevents this attack.
[+] drzaiusapelord|9 years ago|reply
>Because the compression used by just about every website works by eliminating repetitions of text strings, correct guesses result in no appreciable increase in data size while incorrect guesses cause the response to grow larger.

Frankly, I'm a little surprised that popular encryption schemes don't pepper the data with some random noise the client would know how to filter out.

[+] hexane360|9 years ago|reply
What's the consensus on a website owner preventing this? An end user?
[+] babuskov|9 years ago|reply
User: Disable 3rd party cookies in the browser?