{"id":138282,"date":"2019-07-22T12:00:36","date_gmt":"2019-07-22T11:00:36","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=138282"},"modified":"2019-07-29T12:06:23","modified_gmt":"2019-07-29T11:06:23","slug":"my-browser-the-spy-how-extensions-slurped-up-browsing-histories-from-4m-users","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2019\/07\/my-browser-the-spy-how-extensions-slurped-up-browsing-histories-from-4m-users\/","title":{"rendered":"My Browser, the Spy: How Extensions Slurped Up Browsing Histories from 4M Users"},"content":{"rendered":"<blockquote><p><em>Have your tax returns, Nest videos, and medical info been made public? Don&#8217;t trust extensions.<\/em><\/p><\/blockquote>\n<div id=\"attachment_138283\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/leaks.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-138283\" class=\"wp-image-138283\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/leaks.jpg\" alt=\"\" width=\"400\" height=\"225\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/leaks.jpg 800w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/leaks-300x169.jpg 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/leaks-768x432.jpg 768w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><p id=\"caption-attachment-138283\" class=\"wp-caption-text\">Aurich Lawson \/ Getty<\/p><\/div>\n<p><em>18 Jul 2019 &#8211; <\/em>When we use browsers to make medical appointments, share tax returns with accountants, or access corporate intranets, we usually trust that the pages we access will remain private. DataSpii, a newly documented privacy issue in which millions of people\u2019s browsing histories have been collected and exposed, shows just how much about us is revealed when that assumption is turned on its head.<\/p>\n<p>DataSpii begins with browser extensions\u2014available mostly for Chrome but in more limited cases for Firefox as well\u2014that, by Google&#8217;s account, had as many as 4.1 million users. These extensions collected the <a target=\"_blank\" href=\"http:\/\/en.wikipedia.org\/wiki\/URL\" >URLs<\/a>, <a target=\"_blank\" href=\"http:\/\/www.wisegeek.com\/in-html-what-is-a-title-tag.htm\" >webpage titles<\/a>, and in some cases the embedded hyperlinks of every page that the browser user visited. Most of these collected Web histories were then published by a fee-based service called <a target=\"_blank\" href=\"https:\/\/www.nachoanalytics.com\/\" >Nacho Analytics<\/a>, which markets itself as \u201cGod mode for the Internet\u201d and uses the tag line \u201cSee Anyone\u2019s Analytics Account.\u201d<\/p>\n<p>Web histories may not sound especially sensitive, but a subset of the published links led to pages that are not protected by passwords\u2014but only by a hard-to-guess sequence of characters (called tokens) included in the URL. Thus, the published links could allow viewers to access the content at these pages. (Security practitioners have long discouraged the publishing of sensitive information on pages that aren&#8217;t password protected, but the practice remains widespread.)<\/p>\n<p>According to the researcher who discovered and <a target=\"_blank\" href=\"https:\/\/securitywithsam.com\/\" >extensively documented the problem<\/a>, this non-stop flow of sensitive data over the past seven months has resulted in the publication of links to:<\/p>\n<ul>\n<li>Home and business surveillance videos hosted on Nest and other security services<\/li>\n<li>Tax returns, billing invoices, business documents, and presentation slides posted to, or hosted on, Microsoft OneDrive, Intuit.com, and other online services<\/li>\n<li>Vehicle identification numbers of recently bought automobiles, along with the names and addresses of the buyers<\/li>\n<li>Patient names, the doctors they visited, and other details listed by <a target=\"_blank\" href=\"https:\/\/www.drchrono.com\/\" >DrChrono<\/a>, a patient care cloud platform that contracts with medical services<\/li>\n<li>Travel itineraries hosted on Priceline, Booking.com, and airline websites<\/li>\n<li>Facebook Messenger attachments and <a target=\"_blank\" href=\"https:\/\/scontent-iad3-1.xx.fbcdn.net\/v\/t1.0-9\/59752928_10106775951016789_758543554355134464_o.jpg?_nc_cat=100&amp;_nc_ht=scontent-iad3-1.xx&amp;oh=611868fcde47d862f6ad5a60ce08514e&amp;oe=5D677494\" >Facebook photos<\/a>, even when the photos were set to be private.<\/li>\n<\/ul>\n<p>In other cases, the published URLs wouldn\u2019t open a page unless the person following them supplied an account password or had access to the private network that hosted the content. But <em>even in these cases<\/em>, the combination of the full URL and the corresponding page name sometimes divulged sensitive internal information. DataSpii is known to have affected 50 companies, but that number was limited only by the time and money required to find more. Examples include:<\/p>\n<ul>\n<li>URLs referencing teslamotors.com subdomains that aren\u2019t reachable by the outside Internet. When combined with corresponding page titles, these URLs showed employees troubleshooting a \u201cpump motorstall fault,\u201d a \u201cRaven front Drivetrain vibration,\u201d and other problems. Sometimes, the URLs or page titles included vehicle identification numbers of specific cars that were experiencing issues\u2014or they discussed Tesla products or features that had not yet been made public. (See image below)<\/li>\n<li>Internal URLs for pharmaceutical companies Amgen, Merck, Pfizer, and Roche; health providers AthenaHealth and Epic Systems; and security companies FireEye, Symantec, Palo Alto Networks, and Trend Micro. Like the internal URLs for Tesla, these links routinely revealed internal development or product details. A page title captured from an Apple subdomain read: &#8220;Issue where [REDACTED] and [REDACTED] field are getting updated in response of story and collection update APIs by [REDACTED]&#8221;<\/li>\n<li>URLs for JIRA, a project management service provided by Atlassian, that showed Blue Origin, Jeff Bezos\u2019 aerospace manufacturer and sub-orbital spaceflight services company, discussing a competitor and the failure of speed sensors, calibration equipment, and manifolds. Other JIRA customers exposed included security company FireEye, BuzzFeed, NBCdigital, AlienVault, CardinalHealth, TMobile, Reddit, and UnderArmour.<\/li>\n<\/ul>\n<p>Clearly, this is not good. But how did it happen?<\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-138285\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics.png\" alt=\"\" width=\"300\" height=\"358\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics-251x300.png 251w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics2.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-138286\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics2.png\" alt=\"\" width=\"700\" height=\"369\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics2.png 980w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics2-300x158.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2019\/07\/addons-spying-surveillance-big-brother-nacho-analytics2-768x405.png 768w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/p>\n<blockquote>\n<h3>The Data Spy:<\/h3>\n<\/blockquote>\n<p><a target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/07\/dataspii-inside-the-debacle-that-dished-private-data-from-apple-tesla-blue-origin-and-4m-people\/\" >TO CONTINUE READING Go to Original \u2013 arstechnica.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>18 Jul 2019 &#8211; Have your tax returns, Nest videos, and medical info been made public? Don&#8217;t trust extensions.<\/p>\n","protected":false},"author":4,"featured_media":138283,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[216,62,60,203],"tags":[910,1212,462,234,1109,911,461],"class_list":["post-138282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","category-media","category-whistleblowing-surveillance","category-development","tag-big-brother","tag-fraud","tag-google","tag-media","tag-spying","tag-surveillance","tag-technology"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/138282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=138282"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/138282\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media\/138283"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=138282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=138282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=138282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}