<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Konark Modi</title>
    <description>The latest articles on DEV Community by Konark Modi (@konarkmodi).</description>
    <link>https://dev.to/konarkmodi</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F17064%2F6f6c8c80-b590-4dbe-922b-bc9ca7740ad9.JPG</url>
      <title>DEV Community: Konark Modi</title>
      <link>https://dev.to/konarkmodi</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/konarkmodi"/>
    <language>en</language>
    <item>
      <title>Watching them watching us - How websites are leaking sensitive data to third-parties.</title>
      <dc:creator>Konark Modi</dc:creator>
      <pubDate>Wed, 01 May 2019 18:12:00 +0000</pubDate>
      <link>https://dev.to/konarkmodi/watching-them-watching-us-how-websites-are-leaking-sensitive-data-to-third-parties-1nn3</link>
      <guid>https://dev.to/konarkmodi/watching-them-watching-us-how-websites-are-leaking-sensitive-data-to-third-parties-1nn3</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AS5zyXVDrpVR24gnN9Vs0Tg.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AS5zyXVDrpVR24gnN9Vs0Tg.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;What is a TellTale URL ?&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;URL is the most commonly tracked piece of information, the innocent choice to structure a URL based on page content can make it easier to learn a users’ browsing history, address, health information or more sensitive details. They contain sensitive information or can lead to a page which contains sensitive information.&lt;/p&gt;

&lt;p&gt;We call such URLs as TellTaleURLs.&lt;/p&gt;

&lt;p&gt;Let’s take a look at some examples of such URLs.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;EXAMPLE #1:&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt; : &lt;em&gt;donate.mozilla.org (Fixed)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;After you have finished the payment process on &lt;em&gt;donate.mozilla.org&lt;/em&gt;, you are redirected to a “thank you” page. If you look carefully at the URL shown in the below screenshot, it contains some private information like &lt;em&gt;email, country, amount, payment method.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AN0v34u76BSmU2BHaiBu3bA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AN0v34u76BSmU2BHaiBu3bA.png"&gt;&lt;/a&gt;PII in URL on donate.mozilla.org&lt;/p&gt;

&lt;p&gt;Now because this page loads some resources from third-parties and the URL is not sanitised, the same information is also shared with those third-parties via referrer and as a value inside payload sent to the third-parties.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2ApoYlvlf4vFjZkUFtSIokMA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2ApoYlvlf4vFjZkUFtSIokMA.png"&gt;&lt;/a&gt;URL with PII shared when fonts being loaded from Google Apis.&lt;/p&gt;

&lt;p&gt;In this particular case, there were 7 third-parties with whom this information was shared.&lt;/p&gt;

&lt;p&gt;Mozilla was prompt to fix these issues, more details can be found here: &lt;a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1516699" rel="noopener noreferrer"&gt;&lt;em&gt;https://bugzilla.mozilla.org/show_bug.cgi?id=1516699&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  EXAMPLE #2:
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt; : trainline.eu, &lt;em&gt;JustFly.com (Last checked: Aug’18)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Once you finish a purchase like train tickets / flight tickets, you receive an email which has a link to manage your booking. Most of the time, when you click on the link, you are shown the booking details — without having to enter any more details like booking code, username/password.&lt;/p&gt;

&lt;p&gt;This means that the URL itself contains some token which is unique to the user and provides access to the users’ booking.&lt;/p&gt;

&lt;p&gt;It so happens that these URLs are also shared with third-parties, giving these third-parties &lt;a href="https://medium.freecodecamp.org/how-airlines-dont-care-about-your-privacy-case-study-emirates-com-6271b3b8474b" rel="noopener noreferrer"&gt;highly sensitive data&lt;/a&gt; and &lt;a href="https://cliqz.com/en/magazine/lufthansa-data-leak-what-a-single-url-can-reveal-about-you" rel="noopener noreferrer"&gt;access to your bookings&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A8NtyWY9h2A6dXtpII0mKJw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A8NtyWY9h2A6dXtpII0mKJw.png"&gt;&lt;/a&gt;JustFly.com leaking bookingID to 10 third-party domains&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A_DuSiJxfPFzVRMo03uZAow.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A_DuSiJxfPFzVRMo03uZAow.png"&gt;&lt;/a&gt;trainline.eu sharing booking token with 17 third-party domains.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AVrCooHuQytKFgichc18Tug.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AVrCooHuQytKFgichc18Tug.png"&gt;&lt;/a&gt;URL with token being shared via Ref and inside the payload.&lt;/p&gt;

&lt;h3&gt;
  
  
  EXAMPLE #3:
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Website&lt;/strong&gt; : &lt;em&gt;foodora.de, grubhub.com (Last checked: Aug’18)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;One of the pre-requisites to order food online is entering the address where you want the food to be delivered.&lt;/p&gt;

&lt;p&gt;Some popular food delivery websites, convert the address to fine latitude-longitude values and add them to the URL.&lt;/p&gt;

&lt;p&gt;The URL is also shared with third-parties, potentially leaking where the user lives.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AAFuu-VDuK1obV1slx8jtqw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AAFuu-VDuK1obV1slx8jtqw.png"&gt;&lt;/a&gt;Foodora leaking address details to 15 third-party domains.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;To be clear, it’s not just these websites that suffer from such leaks. This problem exists everywhere — it’s a default situation, not a rarity. We’ve seen it with Lufthansa, Spotify, Flixbus, Emirates, and even with medical providers.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Risks of TellTale URLs:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Websites are carelessly leaking sensitive information to plethora of third-parties.&lt;/li&gt;
&lt;li&gt;Most often without users’ consent.&lt;/li&gt;
&lt;li&gt;More dangerously: Most websites are not aware of these leaks while implementing third-party services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Are these problems hard to fix?
&lt;/h3&gt;

&lt;p&gt;As a Software Engineer who has worked for some of the largest eCommerce companies, I understand the need to use third party services for optimising and enhancing not only the Digital Product but also how users interact with the product.&lt;/p&gt;

&lt;p&gt;It is not the usage of third party services that is of concern in this case but the implementation of these services. Owners should always have the control of their website and what the website shares with third party services.&lt;/p&gt;

&lt;p&gt;It is this control that needs to be exercised to limit the leakage of User information.&lt;/p&gt;

&lt;p&gt;It is not a mammoth task, it is just a matter of commitment to preserving the basic right to privacy.&lt;/p&gt;

&lt;p&gt;For example:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Private pages should have &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTML/Element/meta" rel="noopener noreferrer"&gt;noindex meta tags&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Limit the presence of third-party services on private pages.&lt;/li&gt;
&lt;li&gt;
&lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy" rel="noopener noreferrer"&gt;Referrer-Policy&lt;/a&gt; on pages with sensitive data.&lt;/li&gt;
&lt;li&gt;Implement CSP and SRI. Even with a huge footprint of third-party services &lt;a href="https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP" rel="noopener noreferrer"&gt;CSP&lt;/a&gt;, &lt;a href="https://developer.mozilla.org/en-US/docs/Web/Security/Subresource_Integrity" rel="noopener noreferrer"&gt;SRI&lt;/a&gt; are not enabled on majority of the websites.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Introducing Local Sheriff:
&lt;/h3&gt;

&lt;p&gt;Given that such information leakage is dangerous to both users and the organisations, then why is it a wide-spread problem?&lt;/p&gt;

&lt;p&gt;One big reason that these issues exist is lack of awareness.&lt;/p&gt;

&lt;p&gt;A good starting point for websites is to see what information is being leaked or detect presence of TellTaleURLs.&lt;/p&gt;

&lt;p&gt;But in order to find out if the same is happening with the websites you maintain or visit, you need to learn some tools to inspect network traffic, understand first-party — third-party relationship and then make sure you have these tools open during the transaction process.&lt;/p&gt;

&lt;p&gt;To help bridge this gap, we wanted to build a tool with the following guidelines:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Easy to install.&lt;/li&gt;
&lt;li&gt;Monitors and stores all data being exchanged between websites and third-parties — Locally on the user machine.&lt;/li&gt;
&lt;li&gt;Helps identify the users which companies are tracking them on the internet.&lt;/li&gt;
&lt;li&gt;Interface to search information being leaked to third-parties.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Given the above guidelines, browser extension seemed like a reasonable choice. After you install Local-Sheriff, in the background:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Using the WebRequest API, it monitors interaction between first-party and third-party.&lt;/li&gt;
&lt;li&gt;Classifies what URL is first-party and third-party.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Ships with a copy of database from &lt;a href="https://whotracks.me/" rel="noopener noreferrer"&gt;WhoTracksMe&lt;/a&gt;. To map which domain belongs to which company.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Provides an interface you can search for values that you think are private to you and see which websites leak it to which third-parties. Eg: name, email, address, date of birth, cookie etc.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  Revisiting EXAMPLE #1
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Website:&lt;/strong&gt; &lt;em&gt;donate.mozilla.org&lt;/em&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The user has Local-Sheriff installed and donates to mozilla.org.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AN0v34u76BSmU2BHaiBu3bA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AN0v34u76BSmU2BHaiBu3bA.png"&gt;&lt;/a&gt;PII in URL on donate.mozilla.org&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Clicks on the icon to open search interface.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F352%2F1%2AVJpOHOy-ckODGxGlCIDZZw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F352%2F1%2AVJpOHOy-ckODGxGlCIDZZw.png"&gt;&lt;/a&gt;Local sheriff icon.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Enters emailID used on the website donate.mozilla.org.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A6MM--lchMe0o7HUm-KaQgA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A6MM--lchMe0o7HUm-KaQgA.png"&gt;&lt;/a&gt;Search interface Local-Sheriff&lt;/p&gt;

&lt;p&gt;It can be seen that email address used at the time of donation was shared with &lt;strong&gt;~7 third-party domains.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can try it yourselves by installing it:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Firefox:&lt;/strong&gt; &lt;a href="https://addons.mozilla.org/de/firefox/addon/local-sheriff/" rel="noopener noreferrer"&gt;https://addons.mozilla.org/de/firefox/addon/local-sheriff/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chrome:&lt;/strong&gt; &lt;a href="https://chrome.google.com/webstore/detail/local-sheriff/ckmkiloofgfalfdhcfdllaaacpjjejeg" rel="noopener noreferrer"&gt;https://chrome.google.com/webstore/detail/local-sheriff/ckmkiloofgfalfdhcfdllaaacpjjejeg&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;More details&lt;/strong&gt; : &lt;a href="https://www.ghacks.net/2018/08/12/local-sheriff-reveals-if-sites-leak-personal-information-with-third-parties/" rel="noopener noreferrer"&gt;&lt;em&gt;https://www.ghacks.net/2018/08/12/local-sheriff-reveals-if-sites-leak-personal-information-with-third-parties/&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Source Code&lt;/strong&gt; : &lt;a href="https://github.com/cliqz-oss/local-sheriff" rel="noopener noreferrer"&gt;&lt;em&gt;https://github.com/cliqz-oss/local-sheriff&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conferences:&lt;/strong&gt; &lt;a href="https://www.defcon.org/html/defcon-26/dc-26-demolabs.html" rel="noopener noreferrer"&gt;&lt;em&gt;Defcon 26 Demo Labs&lt;/em&gt;&lt;/a&gt;_ ,_ &lt;a href="https://fosdem.org/2019/schedule/event/web_extensions_exposing_privacy_leaks/" rel="noopener noreferrer"&gt;&lt;em&gt;FOSDEM 2019&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Code:&lt;/strong&gt; &lt;a href="https://github.com/cliqz-oss/local-sheriff" rel="noopener noreferrer"&gt;https://github.com/cliqz-oss/local-sheriff&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chrome store:&lt;/strong&gt; &lt;a href="https://chrome.google.com/webstore/detail/local-sheriff/ckmkiloofgfalfdhcfdllaaacpjjejeg" rel="noopener noreferrer"&gt;https://chrome.google.com/webstore/detail/local-sheriff/ckmkiloofgfalfdhcfdllaaacpjjejeg&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for reading and sharing ! :)&lt;/p&gt;

&lt;p&gt;If you liked this story, feel free to 👏👏👏 a few times (Up to 50 times. Seriously).&lt;/p&gt;

&lt;p&gt;Happy Hacking !&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/konarkmodi" rel="noopener noreferrer"&gt;- Konark Modi&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;Credits:&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;em&gt;Special thanks to&lt;/em&gt; &lt;a href="https://twitter.com/Pythux" rel="noopener noreferrer"&gt;&lt;em&gt;Remi&lt;/em&gt;&lt;/a&gt;_ ,_ &lt;a href="https://twitter.com/Pi_Modi" rel="noopener noreferrer"&gt;&lt;em&gt;Pallavi&lt;/em&gt;&lt;/a&gt; &lt;em&gt;for reviewing this post :)&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;em&gt;Title “Watching them watching us “ comes from a joint talk between Local Sheriff and&lt;/em&gt; &lt;a href="https://trackula.org/en/" rel="noopener noreferrer"&gt;&lt;em&gt;Trackula&lt;/em&gt;&lt;/a&gt; &lt;em&gt;at FOSDEM 2019.&lt;/em&gt;
&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>showdev</category>
      <category>discuss</category>
      <category>javascript</category>
      <category>webdev</category>
    </item>
    <item>
      <title>Everyone one of us is being stalked online.</title>
      <dc:creator>Konark Modi</dc:creator>
      <pubDate>Mon, 26 Nov 2018 17:54:33 +0000</pubDate>
      <link>https://dev.to/konarkmodi/everyone-one-of-us-is-being-stalked-online-1o0d</link>
      <guid>https://dev.to/konarkmodi/everyone-one-of-us-is-being-stalked-online-1o0d</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AodPbZJLdkuljedJSRqOFdg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AodPbZJLdkuljedJSRqOFdg.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Do you know which companies know the news you read, friends you meet, your fitness regime, food you order online, where you live, what music you listen to, where you are travelling this summer, what you are planning to buy?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h4&gt;
  
  
  What if a stranger:
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Follows your every move.&lt;/li&gt;
&lt;li&gt;Monitors your internet history and computer usage.&lt;/li&gt;
&lt;li&gt;Taps your phone calls and messages&lt;/li&gt;
&lt;li&gt;Takes your photos without consent.&lt;/li&gt;
&lt;li&gt;Shares personal information gathered about you with people you do not know.&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Do you think you are being stalked,&lt;/strong&gt; how will you react?
&lt;/h4&gt;

&lt;ul&gt;
&lt;li&gt;Change your behaviour&lt;/li&gt;
&lt;li&gt;Confront the stalker&lt;/li&gt;
&lt;li&gt;Report it to the authorities&lt;/li&gt;
&lt;/ul&gt;

&lt;h4&gt;
  
  
  What about stalking in the digital world?
&lt;/h4&gt;

&lt;p&gt;In June this year I shared my thoughts about our privacy in the digital world at &lt;a href="https://munich.15x4.org/" rel="noopener noreferrer"&gt;15x4 Munich meetup&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;The video is available now: &lt;a href="https://www.youtube.com/watch?v=JMkH7r9mDPc" rel="noopener noreferrer"&gt;15x4–15 minutes about Your Online Privacy&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Slides: &lt;a href="https://www.slideshare.net/konarkmodi/our-online-privacy/1" rel="noopener noreferrer"&gt;https://www.slideshare.net/konarkmodi/our-online-privacy/1&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Happy Hacking!&lt;/p&gt;

&lt;p&gt;You can follow me on Twitter at &lt;a href="https://twitter.com/konarkmodi" rel="noopener noreferrer"&gt;Konark Modi&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for reading and sharing ! :)&lt;/p&gt;

</description>
      <category>advice</category>
      <category>bigdata</category>
      <category>future</category>
      <category>technology</category>
    </item>
    <item>
      <title>I found a major flaw in Mozilla’s private browsing mode.</title>
      <dc:creator>Konark Modi</dc:creator>
      <pubDate>Sun, 22 Apr 2018 15:45:16 +0000</pubDate>
      <link>https://dev.to/konarkmodi/i-found-a-major-flaw-in-mozillas-private-browsing-mode-26hi</link>
      <guid>https://dev.to/konarkmodi/i-found-a-major-flaw-in-mozillas-private-browsing-mode-26hi</guid>
      <description>&lt;p&gt;If left unfixed this flaw could have wreaked havoc but Mozilla’s prompt fixes saved the day.&lt;/p&gt;

&lt;p&gt;In this article, I’ll discuss details of a bug I discovered with Mozilla Firefox private browsing mode that made it possible for private browsing sessions to be tracked.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2A_wACV-5_7XXEx3uUSW4sUw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2A_wACV-5_7XXEx3uUSW4sUw.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history" rel="noopener noreferrer"&gt;Private Browsing&lt;/a&gt; is one of the most widely known and used features in modern browsers today. Browsers continually add &lt;a href="https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/" rel="noopener noreferrer"&gt;many&lt;/a&gt; enhancements to private browsing to enhance the users’ privacy.&lt;/p&gt;

&lt;p&gt;The features offered might differ from one browser to another, but at the very least a user using private browsing has the two most basic requirements:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Websites visited in private cannot save any data&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Visited pages are not saved&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Well, I discovered that the Firefox browser Private browsing mode didn’t meet any of the above requirements.&lt;/p&gt;

&lt;p&gt;For a website to track a user across private browsing sessions, it needs to use some persistent storage at the browser level.&lt;/p&gt;

&lt;p&gt;There are multiple ways of storing data in a browser — &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/Storage/LocalStorage" rel="noopener noreferrer"&gt;LocalStorage&lt;/a&gt;, &lt;a href="http://www.w3.org/TR/webdatabase/" rel="noopener noreferrer"&gt;WebSQL&lt;/a&gt; and &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API" rel="noopener noreferrer"&gt;IndexedDB&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I recently came across IndexedDB storage.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;IndexedDB is a low-level API for client-side storage of significant amounts of structured data, including files/blobs — Mozilla Developer Network&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Although, as per the documentation, IndexedDB should not be available in private browsing mode.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2AwYLRaMD6WFi62ndBMCJnDQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2AwYLRaMD6WFi62ndBMCJnDQ.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you use IndexedDB directly on the webpage, it will throw an error:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2ASAoSUwkjpuqHw9KPZloWjg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2ASAoSUwkjpuqHw9KPZloWjg.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But what happens if you combine IndexedDB with &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API" rel="noopener noreferrer"&gt;Web Workers&lt;/a&gt;?&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Web Workers makes it possible to run a script operation in background thread separate from the main execution thread of a web application — Mozilla Developer Network&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;IndexedDB can be accessed in private browsing mode via Web Workers. Not only that, but when the browser is closed, the IndexedDB data is not cleared. This stored &lt;strong&gt;data will persist across multiple private browsing sessions&lt;/strong&gt; because it is not cleared when exiting. 😮&lt;/p&gt;

&lt;p&gt;So let’s look at a few ways this issue could be abused.&lt;/p&gt;

&lt;p&gt;A malicious website can leverage IndexedDB and track users across private browsing sessions. For example, say you visited &lt;strong&gt;badsite.com,&lt;/strong&gt; which uses Web Workers and IndexedDB in private browsing mode. Close the private browsing window, close Firefox, start Firefox again, start private browsing mode, and again visit badsite.com. The website will be able to access the data from your previous private browsing session, as the data is still stored in IndexedDB.&lt;/p&gt;

&lt;p&gt;Let’s assume &lt;strong&gt;siteA.com&lt;/strong&gt; loads an analytics script from &lt;strong&gt;BadAnalyticsSite.com.&lt;/strong&gt; Then another website, &lt;strong&gt;siteB.com&lt;/strong&gt; , also loads an analytics script from the same website &lt;strong&gt;BadAnalyticsSite.com&lt;/strong&gt;. Since the malicious website &lt;strong&gt;BadAnalyticsSite.com&lt;/strong&gt; uses Web Workers and IndexedDB, the website &lt;strong&gt;BadAnalyticsSite.com&lt;/strong&gt; can now track users of websites &lt;strong&gt;siteA.com&lt;/strong&gt; and &lt;strong&gt;siteB.com&lt;/strong&gt; across all their private browsing sessions.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API/Basic_Concepts_Behind_IndexedDB" rel="noopener noreferrer"&gt;IndexedDB adheres to a same-origin policy&lt;/a&gt;, which means that every database has a name that identifies it within an origin. Because domain name is used as part of the file name, this can result in serious issues when used in private mode.&lt;/p&gt;

&lt;p&gt;For example, if a user visits a &lt;a href="https://cdn.cliqz.com/browser-f/fun-demo/test-webworker-indexed-db.html" rel="noopener noreferrer"&gt;test webpage&lt;/a&gt; (demo) which uses Web Workers + IndexedDB hosted on cdn.cliqz.com, and loads a resource from konarkmodi.github.io, the following two entries are created on disk.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2A8IxZqxbAsfVC_xkKxrsk7w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2A8IxZqxbAsfVC_xkKxrsk7w.png"&gt;&lt;/a&gt;Location of IndexedDB: &lt;code&gt;&amp;lt;em&amp;gt;profile/storage&lt;/code&gt; lists Poc web pages.&lt;/p&gt;

&lt;p&gt;Because of the above flaw, a website/tracker could effectively generate a fingerprint and save it. Even if a user were to clear the website history or select the option “forget about this site,” the IndexDB storage is not removed. This can create a permanent storage for a website or a tracker that can be leveraged forever.&lt;/p&gt;

&lt;p&gt;Mozilla encourages security research for their products. In their own words:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;The Mozilla Client Security Bug Bounty Program is designed to encourage security research in Mozilla software and to reward those who help us create the safest Internet software in existence.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;I reported this issue in October 2017 via their &lt;a href="https://www.mozilla.org/en-US/security/client-bug-bounty/" rel="noopener noreferrer"&gt;Bug Bounty Program&lt;/a&gt;, and the issue was fixed in November 2017. They were prompt to identify and fix the issues.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2AHD_jFBEd4XNq3UGb6J_nBg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fproxy%2F1%2AHD_jFBEd4XNq3UGb6J_nBg.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For more details, you can read the complete bug report at &lt;a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1410106" rel="noopener noreferrer"&gt;Mozilla’s Bugzilla&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I really appreciate Mozilla’s efforts and actions in fixing issues with the highest priority when it comes to the privacy of its users.&lt;/p&gt;

&lt;p&gt;Happy Hacking!&lt;/p&gt;

&lt;p&gt;You can follow me on Twitter at &lt;a href="https://twitter.com/konarkmodi" rel="noopener noreferrer"&gt;Konark Modi&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for reading and sharing ! :)&lt;/p&gt;

&lt;p&gt;If you liked this story, feel free to 👏👏👏 a few times (Up to 50 times. Seriously).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Credits: Special thanks to&lt;/em&gt; &lt;a href="https://twitter.com/Pythux" rel="noopener noreferrer"&gt;&lt;em&gt;Remi&lt;/em&gt;&lt;/a&gt; &lt;em&gt;and&lt;/em&gt; &lt;a href="https://twitter.com/Pi_Modi" rel="noopener noreferrer"&gt;&lt;em&gt;Pallavi&lt;/em&gt;&lt;/a&gt; &lt;em&gt;for reviewing this post :)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Originally published at&lt;/em&gt; &lt;a href="https://dev.to/konarkmodi/i-found-a-major-flaw-in-mozillas-private-browsing-mode--and-got-them-to-fix-it-18n3-temp-slug-2572352"&gt;&lt;em&gt;medium.freecodecamp.org&lt;/em&gt;&lt;/a&gt; &lt;em&gt;on April 22, 2018.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
    </item>
    <item>
      <title>Breaking bad to make good: Firefox CVE-2017–7843</title>
      <dc:creator>Konark Modi</dc:creator>
      <pubDate>Sun, 22 Apr 2018 15:45:16 +0000</pubDate>
      <link>https://dev.to/konarkmodi/breaking-bad-to-make-good-firefox-cve-20177843-54o2</link>
      <guid>https://dev.to/konarkmodi/breaking-bad-to-make-good-firefox-cve-20177843-54o2</guid>
      <description>&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A_wACV-5_7XXEx3uUSW4sUw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A_wACV-5_7XXEx3uUSW4sUw.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://support.mozilla.org/en-US/kb/private-browsing-use-firefox-without-history" rel="noopener noreferrer"&gt;Private Browsing Mode (PBM)&lt;/a&gt;is one of the most widely known and used feature in not just Firefox but any major browser. Browsers are continuously trying to add &lt;a href="https://www.mozilla.org/en-US/firefox/features/private-browsing/" rel="noopener noreferrer"&gt;more&lt;/a&gt; &amp;amp; &lt;a href="https://blog.mozilla.org/security/2018/01/31/preventing-data-leaks-by-stripping-path-information-in-http-referrers/" rel="noopener noreferrer"&gt;more&lt;/a&gt; features to PBM to enhance users’ privacy.&lt;/p&gt;

&lt;p&gt;The features offered might differ from one browser to another, but at the very least a user using PBM in any browser has two most basic expectations:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Websites visited in private cannot save any data, and&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Visited pages are not saved.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Well, Firefox Private browsing mode was not meeting any of the above expectations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Technical Details:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For a website to track a user across private-browsing sessions, it needs to use some persisted storage at the browser level.&lt;/p&gt;

&lt;p&gt;There are multiple ways of storing data in browser: &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/Storage/LocalStorage" rel="noopener noreferrer"&gt;LocalStorage&lt;/a&gt;, &lt;a href="http://www.w3.org/TR/webdatabase/" rel="noopener noreferrer"&gt;WebSQL&lt;/a&gt; &amp;amp; &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API" rel="noopener noreferrer"&gt;IndexedDB&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I recently came across IndexedDB storage, although as per the documentation IndexedDB should not be available in PBM.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AwYLRaMD6WFi62ndBMCJnDQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AwYLRaMD6WFi62ndBMCJnDQ.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you use IndexedDB directly on the webpage, it will throw an error:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F588%2F1%2ASAoSUwkjpuqHw9KPZloWjg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F588%2F1%2ASAoSUwkjpuqHw9KPZloWjg.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;But what happens if you combine IndexedDB with &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/Web_Workers_API" rel="noopener noreferrer"&gt;Web Workers&lt;/a&gt;?&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Fallout:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;IndexedDB can be accessed in PBM via Web Workers. Not only that, at browser shutdown it is not cleaned. This stored data will persist across multiple private browsing mode sessions because it is not cleared when exiting.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Websites:&lt;/strong&gt; As a website, you can leverage IndexedDB &amp;amp; be able to track users across PBM session. So if you visit “A.com — which uses Webworkers + IndexedDB” in private browsing, close private browsing window, close Firefox, start Firefox, start private-browsing, visit A.com”, then “A.com” will still be able to access the data previously stored in IndexedDB.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Third-parties:&lt;/strong&gt; Let’s assume A.com loads analytics script from t.com, similarly B.com also loads t.com. Since t.com uses web workers + IndexedDB. t.com, t.com can now track users’ all PBM sessions across domains A.com, B.com and so on.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Disk leaks:&lt;/strong&gt; &lt;a href="https://developer.mozilla.org/en-US/docs/Web/API/IndexedDB_API/Basic_Concepts_Behind_IndexedDB" rel="noopener noreferrer"&gt;IndexedDB adheres to a same-origin policy&lt;/a&gt; which means every database has a name that identifies it within an origin. Because domain name is used as part of the file name this can have serious issues when used in private mode.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;As an example: On visiting a &lt;a href="https://cdn.cliqz.com/browser-f/fun-demo/test-webworker-indexed-db.html" rel="noopener noreferrer"&gt;test webpage&lt;/a&gt; which uses Web Worker + IndexedDB hosted on cdn.cliqz.com which loads a resource from konarkmodi.github.io the following two entries are created on disk.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A8IxZqxbAsfVC_xkKxrsk7w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2A8IxZqxbAsfVC_xkKxrsk7w.png"&gt;&lt;/a&gt;Location of IndexedDB: &lt;code&gt;&amp;lt;em&amp;gt;profile/storage&lt;/code&gt; lists Poc web pages.&lt;/p&gt;

&lt;p&gt;Because of the above flaw, a website/tracker could effectively generate a fingerprint &amp;amp; save the fingerprint. Even on the “clear history” signal or the option “forget about this site”, this storage is not removed. Hence creating a permanent storage for a website or a tracker, that can be leveraged forever.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Report &amp;amp; Fixes:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AHD_jFBEd4XNq3UGb6J_nBg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1024%2F1%2AHD_jFBEd4XNq3UGb6J_nBg.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Mozilla encourages security research for their products. In their own words:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;“The Mozilla Client Security Bug Bounty Program is designed to encourage security research in Mozilla software and to reward those who help us create the safest Internet software in existence.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I reported this issue in October 2017 via their &lt;a href="https://www.mozilla.org/en-US/security/client-bug-bounty/" rel="noopener noreferrer"&gt;Bug Bounty program&lt;/a&gt; . They were prompt to identify &amp;amp; fix the issues. This was fixed in November 2017 with &lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2017-27/#CVE-2017-7843" rel="noopener noreferrer"&gt;Firefox 57.0.1&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For more details you can read the complete bug report at &lt;a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1410106" rel="noopener noreferrer"&gt;Mozilla’s Bugzilla&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;I really appreciate Mozilla’s efforts and actions in fixing issues with highest priority when it comes to users’ privacy.&lt;/p&gt;

&lt;p&gt;Happy Hacking !&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/konarkmodi" rel="noopener noreferrer"&gt;- Konark Modi&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for reading and sharing ! :)&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Credits: Special thanks to&lt;/em&gt; &lt;a href="https://twitter.com/Pythux" rel="noopener noreferrer"&gt;&lt;em&gt;Remi&lt;/em&gt;&lt;/a&gt;_ ,_ &lt;a href="https://twitter.com/Pi_Modi" rel="noopener noreferrer"&gt;&lt;em&gt;Pallavi&lt;/em&gt;&lt;/a&gt; &lt;em&gt;for reviewing this post :)&lt;/em&gt;&lt;/p&gt;

</description>
      <category>browsers</category>
      <category>privacy</category>
      <category>data</category>
      <category>security</category>
    </item>
    <item>
      <title>Airline websites don’t care about your privacy follow-up: Emirates responds to my article with…</title>
      <dc:creator>Konark Modi</dc:creator>
      <pubDate>Tue, 06 Mar 2018 22:04:08 +0000</pubDate>
      <link>https://dev.to/konarkmodi/airline-websites-dont-care-about-your-privacy-follow-up-emirates-responds-to-my-article-with-lg5</link>
      <guid>https://dev.to/konarkmodi/airline-websites-dont-care-about-your-privacy-follow-up-emirates-responds-to-my-article-with-lg5</guid>
      <description>&lt;h3&gt;
  
  
  Airline websites don’t care about your privacy follow-up: Emirates responds to my article with full-on denial
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ir_yimim--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/500/1%2AETvXCCF1aTIj9Kial1iOhQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ir_yimim--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/500/1%2AETvXCCF1aTIj9Kial1iOhQ.jpeg" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Yesterday, &lt;a href="https://www.theregister.co.uk/2018/03/05/emirates_dinged_for_slipshod_privacy_practices/"&gt;The Register&lt;/a&gt; wrote about my exposé on &lt;a href="https://medium.freecodecamp.org/how-airlines-dont-care-about-your-privacy-case-study-emirates-com-6271b3b8474b"&gt;the privacy failings of airline websites&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;When I published my original article last Friday, Emirates had failed to respond to my request for comments. But Emirates did respond to The Register, with the following statement:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--PZRAyQty--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A-EluBUYGCYv9ogJfi6jZSQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--PZRAyQty--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A-EluBUYGCYv9ogJfi6jZSQ.png" alt=""&gt;&lt;/a&gt;Comment from Emirates on theregister.co.uk&lt;/p&gt;

&lt;p&gt;Their statement is not only vague — it is factually incorrect. And I feel it’s my professional duty to call them out on this.&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;A breakdown of their statement, and how their logic breaks down when you really think about it&lt;/strong&gt;
&lt;/h3&gt;

&lt;h4&gt;
  
  
  Issue #1
&lt;/h4&gt;

&lt;p&gt;First Emirates says, “&lt;em&gt;We can confirm that none of the security vulnerabilities highlighted will allow a breach (unauthorised access) of personal data on our website or mobile app.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;How does Emirates define breach? Well, Wikipedia defines a data breach like this:&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorised to do so.”&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;In its &lt;a href="https://www.emirates.com/english/sitetools/privacy_policy.aspx#"&gt;Privacy Policy&lt;/a&gt;, Emirates highlights the importance of safeguarding Booking Reference information:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OCwD7x8h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AKiEsEa0j0w0D0U8GQKAk6Q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OCwD7x8h--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AKiEsEa0j0w0D0U8GQKAk6Q.png" alt=""&gt;&lt;/a&gt;Privacy policy highlighting risks of sharing Booking reference number.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Update 8th March, 2018:&lt;/strong&gt; Another exhibit how Emirates seems to have forgotten to pay heed to their own advice &lt;em&gt;“keep your Booking Reference safe”&lt;/em&gt; and is &lt;strong&gt;still&lt;/strong&gt; sending it to Google Analytics from mobile app, via &lt;strong&gt;key:cd8&lt;/strong&gt; (unmasked). I have masked the fields in the picture to ensure Privacy.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8xKTLXza--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AfaUTkAeDhF9XCCplJ8kcgA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8xKTLXza--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AfaUTkAeDhF9XCCplJ8kcgA.png" alt=""&gt;&lt;/a&gt;Sending PNR via field cd8 to Google-Analytics.&lt;/p&gt;

&lt;p&gt;For any changes to an existing booking, a &lt;strong&gt;Booking Reference number&lt;/strong&gt; and &lt;strong&gt;Last name&lt;/strong&gt; is all that is required. There is no requirement to verify who initially made the booking and whether the person making the changes is authorised to do so or not.&lt;/p&gt;

&lt;p&gt;Emirates.com and the Emirates mobile app version (6.1.0) both allow access to their Manage Booking section based &lt;strong&gt;only&lt;/strong&gt; on these two data points. This a standard practice across airlines, and this is not the point of contention for the purposes of this article.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;But this is when it gets worrisome&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;As of March 6th, 2018, Booking Reference number and Last Name, among many other data points, are still being sent to the third-parties implemented. Does Crazy Egg, Boxever, Coremetrics need Booking Reference Number and Last name for showing Heat Map of the page? I don’t think so.&lt;/p&gt;

&lt;p&gt;This is the problem area — passing on user’s personal information to third parties who have absolutely no need for this information to render their services to Emirates &lt;em&gt;“for the purpose of improving the online browsing experience.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;The importance of using HTTPS links has been established over and over again by everyone who is anyone in the field of Technology. HTTP links are not only vulnerable to Man-In-The-Middle attacks but can also suffer from injection of malicious data.&lt;/p&gt;

&lt;p&gt;I am not sure how Emirates is confident enough to &lt;em&gt;“confirm that none of the security vulnerabilities highlighted in (Mr. Modi’s) article will allow a breach (unauthorized access) of personal data on our website or mobile app”&lt;/em&gt; when track.emirates.email still does not have any SSL. How do they plan to avoid Man-in-the-Middle attacks?&lt;/p&gt;

&lt;h4&gt;
  
  
  Issue #2
&lt;/h4&gt;

&lt;p&gt;Emirates says, &lt;em&gt;“Whilst we do use a number of third party analytical tools on our sites for the purpose of improving the online browsing experience, we continually review how these are implemented.”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;I shared in the article how Passport information and contact details were earlier un-obfuscated on both website and Mobile app. While the website was fixed when I checked last in February 2018, the mobile app continues to be problematic in this area. This can happen only when there is a lack of communication between the Website and Mobile Development Team or they did not &lt;em&gt;“continually review the implementation”&lt;/em&gt; across all products.&lt;/p&gt;

&lt;p&gt;Another question that begs to be answered is what are the parameters for reviewing the implementation of third parties. Unless the mandate is strictly to NOT leak any kind of user-information, the reviews could be of anything and would not have the slightest impact on the security and vulnerability of user information being freely passed on the third parties.&lt;/p&gt;

&lt;p&gt;The last time this issue was highlighted to Emirates was in October 2017. In the 5 months that have passed since then these issues were not picked up by the review team. Maybe they are not as &lt;em&gt;“continuous”&lt;/em&gt; as Emirates claims them to be.&lt;/p&gt;

&lt;h4&gt;
  
  
  &lt;strong&gt;Issue #3&lt;/strong&gt;
&lt;/h4&gt;

&lt;p&gt;Emirates says, &lt;em&gt;“Customers can find out more about how we use personal data and how they can opt out by reading our privacy policy on emirates.com”&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ebNp1kh8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A7okL7KeRkSJAEq23ho92jQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ebNp1kh8--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2A7okL7KeRkSJAEq23ho92jQ.png" alt=""&gt;&lt;/a&gt;Third-parties listed on Privacy Policy page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--t24n0SfV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AgmN-wKtj2Q8MsqihEncAUA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--t24n0SfV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AgmN-wKtj2Q8MsqihEncAUA.png" alt=""&gt;&lt;/a&gt;Third-parties actually present.&lt;/p&gt;

&lt;p&gt;Upon a thorough review of &lt;a href="https://www.emirates.com/english/sitetools/privacy_policy.aspx"&gt;Emirates’ Privacy &amp;amp; Cookie Policy&lt;/a&gt;, these are the points to note:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;It does not list &lt;strong&gt;ALL&lt;/strong&gt; the implemented third-parties and the information being shared with them. Third parties like Boxever, ads-twitter.com, Coremetrics, Imigix, bing and many other that I had aggregated from their website are not even mentioned in their Privacy Policy.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Opt-out options available only mentions ways using about cookies, YourOnlineChoices. This means that not only the information provided in Privacy Policy is incomplete but also does not share any options to opt-out of services CrazyEgg, BoxEver, Coremetrics etc. The process is tedious and cumbersome.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The option to opt-out is biased based on the country of residence of the users. If you are a resident of EU you can use this link to opt-out. If you are a resident of USA this is the link to opt-out. But if you are a resident of any other region, I am sorry to break it to you that you have been short-changed.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mXCxRKPc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AWChlUO-o_SajAjHIXEHObw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mXCxRKPc--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn-images-1.medium.com/max/1024/1%2AWChlUO-o_SajAjHIXEHObw.png" alt=""&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Opting-out of cookies is not going to have any impact on the data leaks highlighted in the article because the referrer is not being cleaned. Anybody with basic tech knowledge can confirm this.&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;In Short&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Even if the user somehow manages to opt-out of all the trackers using the methods listed and not listed, Emirates will still leak the Booking Reference and Last Name which is enough to access all other sensitive information because the implementation of these third-party services on Emirates.com is flawed.&lt;/p&gt;

&lt;p&gt;Emirates needs to understand that once the information has been shared with third-parties, there is very little they can do to control how it is being used or might be used in the future, as they have themselves mentioned in their privacy policy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;It is one thing for Emirates to think that these issues are not critical enough for them to take necessary actions to fix them. It’s an entirely different thing to say that the information shared in the article is &lt;em&gt;“not true”.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;I hope they fix these issues sooner rather than later.&lt;/p&gt;

&lt;p&gt;Happy Hacking !&lt;/p&gt;

&lt;p&gt;&lt;a href="https://twitter.com/konarkmodi"&gt;- Konark Modi&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for reading and sharing ! :)&lt;/p&gt;

&lt;p&gt;If you liked this story, feel free to 👏👏👏 a few times (Up to 50 times. Seriously).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Credits: Special thanks to&lt;/em&gt; &lt;a href="https://twitter.com/Pythux"&gt;&lt;em&gt;Remi&lt;/em&gt;&lt;/a&gt;_ ,_ &lt;a href="https://twitter.com/Pi_Modi"&gt;&lt;em&gt;Pallavi&lt;/em&gt;&lt;/a&gt; &lt;em&gt;for reviewing this post too :)&lt;/em&gt;&lt;/p&gt;




</description>
      <category>technology</category>
      <category>privacy</category>
      <category>gdpr</category>
      <category>security</category>
    </item>
    <item>
      <title>Adoption of HTTPS protocol on government serviceÂ websites</title>
      <dc:creator>Konark Modi</dc:creator>
      <pubDate>Wed, 19 Apr 2017 22:47:15 +0000</pubDate>
      <link>https://dev.to/konarkmodi/adoption-of-https-protocol-on-government-servicewebsites</link>
      <guid>https://dev.to/konarkmodi/adoption-of-https-protocol-on-government-servicewebsites</guid>
      <description>&lt;p&gt;Last week, Freedom of the Press Foundation announced the project &lt;a href="https://securethe.news/" rel="noopener noreferrer"&gt;“secure the news &lt;/a&gt; which tracks the adoption of HTTPS on news websites.&lt;br&gt;
Inspired by it, we decided to do an analysis on&lt;a href="https://services.india.gov.in/" rel="noopener noreferrer"&gt; Government of India digital services&lt;/a&gt; and track the adoption of HTTPS across them.&lt;br&gt;
&lt;a href="http://digitalindia.gov.in/content/about-programme" rel="noopener noreferrer"&gt;Digital India&lt;/a&gt; is a campaign launched by the &lt;a href="https://en.wikipedia.org/wiki/Government_of_India" rel="noopener noreferrer"&gt;Government of India&lt;/a&gt; to ensure that Government services are made available to citizens electronically by improving online infrastructure and by increasing Internet connectivity or by making the country digitally empowered in the field of technology.&lt;br&gt;
Launched on 1 July 2015 by &lt;a href="https://en.wikipedia.org/wiki/Prime_Minister_of_India" rel="noopener noreferrer"&gt;Prime Minister&lt;/a&gt; &lt;a href="https://en.wikipedia.org/wiki/Prime_Minister_of_India" rel="noopener noreferrer"&gt;Narendra Modi&lt;/a&gt;, the initiative spans across three core components:&lt;br&gt;
The creation of digital infrastructure&lt;br&gt;
Delivery of services digitally&lt;br&gt;
&lt;a href="https://en.wikipedia.org/wiki/Digital_literacy" rel="noopener noreferrer"&gt;Digital literacy&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The Digital India programme has, as of date, a total 1995 &lt;a href="https://services.india.gov.in/category/listing?ln=en" rel="noopener noreferrer"&gt;services&lt;/a&gt; listed on their website, categorised as below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1%2AkpFPprKFjIMYgXUOeg0K9g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1%2AkpFPprKFjIMYgXUOeg0K9g.png" title="Service Categories" alt="alt text"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1%2ABTMikNH-OgX5ENwtKPJkoA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1%2ABTMikNH-OgX5ENwtKPJkoA.png" title="Breakup of 874 domains acrossÂ services" alt="alt text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;While some of the services are more information centric with respect to policy updates, etc, there are a few websites that deal with user information on everyday basis, ex: &lt;a href=""&gt;Air India&lt;/a&gt;, &lt;a href=""&gt;passport services&lt;/a&gt;, Income and Taxation services, Citizenship and Visas, &lt;a href=""&gt;Online hospital appointments&lt;/a&gt; etc.&lt;/p&gt;

&lt;p&gt;From the list of services, we analysed 874 valid domains for adoption of HTTPS protocol. Our findings are:&lt;/p&gt;

&lt;h4&gt;
  
  
  a. 31% have a validÂ HTTPS
&lt;/h4&gt;

&lt;h4&gt;
  
  
  b. Only 7.4% default toÂ HTTPS
&lt;/h4&gt;

&lt;h4&gt;
  
  
  c. Less then 1.5% have &lt;a href=""&gt;HSTS&lt;/a&gt;Â enabled
&lt;/h4&gt;

&lt;h4&gt;
  
  
  d. Merely 2 sites are on the &lt;a href=""&gt;HSTS preloaded list&lt;/a&gt;
&lt;/h4&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1%2AW3P-IpdP5nch4hPOMDrpbA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F1600%2F1%2AW3P-IpdP5nch4hPOMDrpbA.png" title="HTTPS adoption across service categories" alt="alt text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What does this mean?
&lt;/h2&gt;

&lt;p&gt;While this is a great first step for the government towards bringing in transparency and accountability by going digital, the next steps ought to be towards privacy &amp;amp; security of user information and data protection. Actively adopting security measures will definitely result in lesser vulnerability of data thefts/ hacks or other cyber threats that present itself in friendly or unfriendly environment. The primary, and also the simplest, step towards data protection and privacy is adopting HTTPS protocol.&lt;/p&gt;

&lt;h2&gt;
  
  
  Prologue on HTTPS or why is it importantÂ ?
&lt;/h2&gt;

&lt;p&gt;HTTPS connection is easily recognised by the most novice of Internet users for the lock icon it displays in your web browser’s address bar (the “S in HTTPS means “secure”).&lt;/p&gt;

&lt;p&gt;It signifies that the connection between you and the website you are reading is encrypted, so someone spying on your internet connectionâ€Š–â€Šwhether a criminal trying to eavesdrop on you through public WiFi or a government that has access to raw Internet trafficâ€Š–â€Šcannot see the information that you are transmitting.&lt;/p&gt;

&lt;p&gt;A regular HTTP connection means that such attackers can potentially see the search terms or articles you are reading, spy on your username and password, or spoof a website to steal your personal information. Unencrypted HTTP traffic is also easier to filter and block, allowing for selective censorship of articles, subjects, specific reporters or outlets by authoritarian governments.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Protects user’s sensitive information.&lt;/li&gt;
&lt;li&gt;Protects integrity of your website.&lt;/li&gt;
&lt;li&gt;It is the future of the web.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://securethe.news/why/" rel="noopener noreferrer"&gt;10 good reasons to switch to HTTPS&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Rise of HSTS
&lt;/h2&gt;

&lt;p&gt;HSTS(HTTP Strict Transport Security), is a relatively new standard that aims to bolster the strength of HTTPS connections.&lt;/p&gt;

&lt;p&gt;When a web server implements and enables HSTS, all browsers that connect to it will be forced to do so strictly via HTTPS. That means, there won’t be that exploitable vulnerability wherein a browser would initially connect via HTTP before it gets redirected to HTTPSâ€Š–â€Šexcept for that very first instance that the browser makes contact with the web server.&lt;/p&gt;

&lt;p&gt;Major benefits of having a site on HSTS are the following:&lt;/p&gt;

&lt;p&gt;..* Defence against sslstrip-like attacks. The initial navigation to somewebsite.com is automatically upgraded to HTTPS&lt;/p&gt;

&lt;p&gt;..* Zero tolerance for certification problems. The user is not permitted to “click through anything such as a self-signed cert.&lt;/p&gt;

&lt;p&gt;If you have a site wide implementation of SSL, as an additional layer of security, the website owners could also apply for &lt;a href="https://hstspreload.org/" rel="noopener noreferrer"&gt;HSTS Preloading&lt;/a&gt;. A detailed explanation on why HSTS preloading matters specially for sites dealing with sensitive user data can be found &lt;a href="https://www.troyhunt.com/understanding-http-strict-transport/" rel="noopener noreferrer"&gt;here&lt;/a&gt;.&lt;/p&gt;

&lt;h2&gt;
  
  
  Resources and tips for deploying HTTPS by default
&lt;/h2&gt;

&lt;p&gt;List of recommended resources to help you understand HTTPS and how to go about deploying it:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://pulse.cio.gov/" rel="noopener noreferrer"&gt;Federal government adoption of HTTPS&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;EFFâ€Š–â€Š&lt;a href="https://www.eff.org/https-everywhere/deploying-https" rel="noopener noreferrer"&gt;How to deploy HTTPS correctly&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Mozillaâ€Š–â€Š&lt;a href="https://wiki.mozilla.org/Security/Guidelines/Web_Security" rel="noopener noreferrer"&gt;Security/Guidelines/Web Security&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Ivan Ristic’s &lt;a href="https://www.feistyduck.com/books/bulletproof-ssl-and-tls/" rel="noopener noreferrer"&gt;Bulletproof SSL and TLS&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Google Developer’s Blogâ€Š–â€Š&lt;a href="https://developers.google.com/web/fundamentals/security/encrypt-in-transit/enable-https" rel="noopener noreferrer"&gt;Enabling HTTPS on Your Servers&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;&lt;a href=""&gt;Let’s Encrypt&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Next steps and To-do’s
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;This blog post is certainly the first step.&lt;/li&gt;
&lt;li&gt;We are currently working on making it a formal project, with automation to verify the adoption of HTTPS.&lt;/li&gt;
&lt;li&gt;Make all the codebase + data open and put it on Github.&lt;/li&gt;
&lt;li&gt;Create a more comprehensive list, based on services that the websites offer.&lt;/li&gt;
&lt;li&gt;Expand to other countries government services as well.&lt;/li&gt;
&lt;li&gt;Contribute rulesets to &lt;a href="https://www.eff.org/https-everywhere" rel="noopener noreferrer"&gt;HTTPS Everywhere extension&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Team
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://twitter.com/bibhasdn" rel="noopener noreferrer"&gt;Bibhas&lt;/a&gt;, &lt;a href="https://twitter.com/Pi_Modi" rel="noopener noreferrer"&gt;Pallavi&lt;/a&gt;, &lt;a href="https://twitter.com/konarkmodi" rel="noopener noreferrer"&gt;Konark&lt;/a&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>privacy</category>
      <category>digitalindia</category>
      <category>https</category>
    </item>
  </channel>
</rss>
