[PrivacyBadger] How should Privacy Badger deal with Flash supercookies?
Maxim Nazarenko
nz.phone at mail.ru
Fri Aug 1 09:16:02 PDT 2014
Wouldn't Flashblock (and similar click-to-flash plugins) interfere with
flash injection?
Best regards,
Maxim Nazarenko
P.S. Chrome is no longer Webkit :P
On 29 July 2014 23:37, Peter Eckersley <pde at eff.org> wrote:
> r33lmm has offered to give us some advice/assistance in handling Flash in
> privacy badger, which is really about handling Flash LSO cookies.
>
> Flash LSOs are going to be a bit tricky for us to detect and (when
> yellowlisted) block or 3rd-party-block in Privacy Badger, and especially
> Privacy Badger for Chrome. In Firefox we have extra browser API options,
> and the option of walking into the filesystem and messing with the Flash
> config file or the Flash cookies on disk, but even there LSOs will be
> tricky.
>
> One strategy would be to inject a content script which runs some flash
> into every page, that goes in messes with LSOs in some clever way. But
> that seems horrible, and only worth considering if we can make our Flash
> run if and only if the page has some Flash of its own that's about to
> execute.
>
> Another strategy would be to forcibly set click-to-play for Flash, which
> is sort of ducking the question but might be ok.
>
> --
> Peter Eckersley pde at eff.org
> Technology Projects Director Tel +1 415 436 9333 x131
> Electronic Frontier Foundation Fax +1 415 436 9993
> _______________________________________________
> PrivacyBadger mailing list
> PrivacyBadger at eff.org
> https://lists.eff.org/mailman/listinfo/privacybadger
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.eff.org/pipermail/privacybadger/attachments/20140801/f5d49054/attachment.html>
More information about the PrivacyBadger
mailing list