
14
F. Yandex Browser
Yandex sends text to yandes.ru/suggest-browser as it is typed.
A request is sent for every letter typed, resulting in a total
of 26 requests. Each request is sent with a cookie containing
the multiple identifiers set on Yandex startup. Once the typed
URL has been navigated to Yandex then makes two additional
requests: one to yandex.ru and one to translate.yandex.ru. The
request to yandex.ri sends the domain of the URL entered
while the request to translate.yandex.ru sends the text content
of the page that has just been visited.
VIII. CONCLUSIONS
We study six browsers: Google Chrome, Mozilla Firefox,
Apple Safari, Brave Browser, Microsoft Edge and Yandex
Browser. For Brave with its default settings we did not find
any use of identifiers allowing tracking of IP address over
time, and no sharing of the details of web pages visited with
backend servers. Chrome, Firefox and Safari all share details
of web pages visited with backend servers. For all three this
happens via the search autocomplete feature, which sends web
addresses to backend servers in realtime as they are typed.
In Chrome a persistent identifier is sent alongside these web
addresses, allowing them to be linked together. In addition,
Firefox includes identifiers in its telemetry transmissions that
can potentially be used to link these over time. Telemetry can
be disabled, but again is silently enabled by default. Firefox
also maintains an open websocket for push notifications that
is linked to a unique identifier and so potentially can also
be used for tracking and which cannot be easily disabled.
Safari defaults to a choice of start page that potentially
leaks information to multiple third parties and allows them
to preload pages containing identifiers to the browser cache.
Safari otherwise made no extraneous network connections
and transmitted no persistent identifiers, but allied iCloud
processes did make connections containing identifiers.
From a privacy perspective Microsoft Edge and Yandex are
qualitatively different from the other browsers studied. Both
send persistent identifiers than can be used to link requests
(and associated IP address/location) to back end servers. Edge
also sends the hardware UUID of the device to Microsoft
and Yandex similarly transmits a hashed hardware identifier to
back end servers. As far as we can tell this behaviour cannot
be disabled by users. In addition to the search autocomplete
functionality that shares details of web pages visited, both
transmit web page information to servers that appear unrelated
to search autocomplete.
REFERENCES
[1] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-
site measurement and analysis,” in Proceedings of the 2016 ACM
SIGSAC Conference on Computer and Communications Security, 2016,
pp. 1388–1401. [Online]. Available: https://doi.org/10.1145/2976749.
2978313
[2] W. Meng, B. Lee, X. Xing, and W. Lee, “Trackmeornot: Enabling
flexible control on web tracking,” in Proceedings of the 25th
International Conference on World Wide Web, 2016, pp. 99–109.
[Online]. Available: https://doi.org/10.1145/2872427.2883034
[3] N. Bielova, “Web tracking technologies and protection mechanisms,” in
Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security, 2017, pp. 2607–2609. [Online]. Available:
https://doi.org/10.1145/3133956.3136067
[4] G. Aggarwal, E. Bursztein, C. Jackson, and D. Boneh, “An analysis of
private browsing modes in modern browsers,” in Proceedings of the 19th
USENIX Conference on Security. USENIX Association, 2010.
[5] N.Tsalis, A.Mylonas, A.Nisioti, D.Gritzalis, and V.Katos, “Exploring
the protection of private browsing in desktop browsers,” Computers &
Security, 2017.
[6] “Google Safe Browsing API (v4),” 2020. [Online]. Available:
https://developers.google.com/safe-browsing/v4
[7] “Chrome App AutoUpdate API,” 2020, accessed 21 Feb 2020. [Online].
Available: https://developer.chrome.com/apps/autoupdate
[8] “Chrome Privacy White Paper (January 09, 2020),” 2020. [Online].
Available: https://www.google.com/chrome/privacy/whitepaper.html
[9] “Firefox Telemetry API,” 2020, accessed 21 Feb 2020. [Online].
Available: https://firefox-source- docs.mozilla.org/toolkit/components/
telemetry/
[10] “Firefox Normandy API,” 2020, accessed 21 Feb 2020. [Online].
Available: https://mozilla.github.io/normandy/
[11] L. Sweeney, “k-anonymity: A model for protecting privacy,” Interna-
tional Journal of Uncertainty, Fuzziness and Knowledge-Based Systems,
vol. 10, no. 05, pp. 557–570, 2002.
[12] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam,
“l-diversity: Privacy beyond k-anonymity,” ACM Transactions on Knowl-
edge Discovery from Data (TKDD), vol. 1, no. 1, pp. 3–es, 2007.
[13] G. P. and P. K, “On the Anonymity of Home/Work Location Pairs,” in
Pervasive Computing, 2009.
[14] M. Srivatsa and M. Hicks, “Deanonymizing mobility traces: Using social
network as a side-channel,” in Proceedings of the 2012 ACM conference
on Computer and communications security, 2012, pp. 628–637.
[15] Z. Weinberg, E. Y. Chen, P. R. Jayaraman, and C. Jackson, “I still
know what you visited last summer: Leaking browsing history via user
interaction and side channel attacks,” in 2011 IEEE Symposium on
Security and Privacy. IEEE, 2011, pp. 147–161.
[16] ?ukasz Olejnik, C. Castelluccia, and A. Janc, “Why johnny can’t browse
in peace: On the uniqueness of web browsing history pattern,” in In Hot
topics in Privacy Enhancing Technologies, 2012.
[17] “appFirewall (v2.02),” 2020, accessed 21 Feb 2020. [Online]. Available:
https://github.com/doug-leith/appFirewall
[18] “QUIC, a multiplexed stream transport over UDP,” 2020, accessed 21
Feb 2020. [Online]. Available: https://https://www.chromium.org/quic
[19] A. Cortesi, M. Hils, T. Kriechbaumer, and contributors, “mitmproxy: A
free and open source interactive HTTPS proxy (v5.01),” 2020. [Online].
Available: https://mitmproxy.org/
[20] “Yandex Safe Browsing API,” 2020. [Online]. Available: https:
//tech.yandex.com/safebrowsing/
[21] T. Gerbet, A. Kumar, and C. Lauradoux, “A Privacy Analysis of Google
and Yandex Safe Browsing,” in Proceedings of 46th Annual IEEE/IFIP
International Conference on Dependable Systems and Networks (DSN).
The publisher of the proceedings, 2016, pp. 347–358.
[22] H. Cui, Y. Zhou, C. Wang, X. Wang, Y. Du, and Q. Wang, “PPSB:
An Open and Flexible Platform for Privacy-Preserving Safe Browsing,”
IEEE Transactions on Dependable and Secure Computing, 2019.
[23] “Chromium Source Code,” 2020, accessed 21 Feb 2020. [Online].
Available: https://github.com/chromium/chromium
[24] “Reference Implementation for the Usage of Google Safe Browsing
APIs (v4),” 2020, accessed 21 Feb 2020. [Online]. Available:
https://github.com/google/safebrowsing
[25] “Issue 103243: Cookies no longer sent with safebrowsing,”
2011. [Online]. Available: https://bugs.chromium.org/p/chromium/
issues/detail?id=103243
[26] “Firefox Source Code (v 73.0),” 2020, accessed 21 Feb 2020. [Online].
Available: https://archive.mozilla.org/pub/firefox/releases/73.0/
[27] “Firefox Push API,” 2020, accessed 21 Feb 2020. [Online]. Available:
https://mozilla.github.io/application-services/docs/push/welcom.html