[PrivacyBadger] How should Privacy Badger deal with Flash supercookies?

Maxim Nazarenko nz.phone at mail.ru
Fri Aug 1 09:16:02 PDT 2014


Wouldn't Flashblock (and similar click-to-flash plugins) interfere with
flash injection?

Best regards,
Maxim Nazarenko

P.S. Chrome is no longer Webkit :P


On 29 July 2014 23:37, Peter Eckersley <pde at eff.org> wrote:

> r33lmm has offered to give us some advice/assistance in handling Flash in
> privacy badger, which is really about handling Flash LSO cookies.
>
> Flash LSOs are going to be a bit tricky for us to detect and (when
> yellowlisted) block or 3rd-party-block in Privacy Badger, and especially
> Privacy Badger for Chrome.  In Firefox we have extra browser API options,
> and the option of walking into the filesystem and messing with the Flash
> config file or the Flash cookies on disk, but even there LSOs will be
> tricky.
>
> One strategy would be to inject a content script which runs some flash
> into every page, that goes in messes with LSOs in some clever way.  But
> that seems horrible, and only worth considering if we can make our Flash
> run if and only if the page has some Flash of its own that's about to
> execute.
>
> Another strategy would be to forcibly set click-to-play for Flash, which
> is sort of ducking the question but might be ok.
>
> --
> Peter Eckersley                            pde at eff.org
> Technology Projects Director      Tel  +1 415 436 9333 x131
> Electronic Frontier Foundation    Fax  +1 415 436 9993
> _______________________________________________
> PrivacyBadger mailing list
> PrivacyBadger at eff.org
> https://lists.eff.org/mailman/listinfo/privacybadger
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.eff.org/pipermail/privacybadger/attachments/20140801/f5d49054/attachment.html>


More information about the PrivacyBadger mailing list