Firefox 3 Antiphishing Sends Your URLs To Google 296
iritant writes "As we were discussing, Gran Paradiso — the latest version of Firefox — is nearing release. Gran Paradiso includes a form of malware protection that checks every URL against a known list of sites. It does so by sending each URL to Google. In other words, if people enable this feature, they get some malware protection, and Google gets a wealth of information about which sites are popular (or, for that matter, which sites should be checked for malware). Fair deal? Not to worry — the feature is disabled by default."
And Google does it again! (Score:4, Interesting)
http://slashdot.org/article.pl?sid=05/05/04/2223238&tid=217 [slashdot.org]
Google has your mail. They have your searches. Now they are going for your browsing history.
Add it all together and you have a lot of business intelligence. Time to target consumers and influence opinions?
Smart yes, but still quite scary.
What information are they going to collect next? What are they doing with all the information that they are already collecting?
Re:And Google does it again! (Score:5, Insightful)
They all do this, which is why I don't use them. Some common sense will tell you if a site is phishing. If you try to go to a bank website and get http://bank-0-am3rika.tv/l0g0n [bank-0-am3rika.tv], then you might want to reconsider putting in your username and password.
Silly sensationalism. nothing more.
Re:And Google does it again! (Score:5, Interesting)
Re: (Score:2)
Fixed that for you. (Score:5, Insightful)
Re:Fixed that for you. (Score:5, Funny)
Re:Fixed that for you. (Score:5, Funny)
Re:Fixed that for you. (Score:5, Insightful)
Re:Fixed that for you. (Score:5, Funny)
I bet.
Re:And Google does it again! (Score:5, Insightful)
Re: (Score:3, Interesting)
PS: Yes, I am making fun of the entire concept of ligatures. They are silly. I do not want "fi" replaced with a single glyph where the dot of the i is part of the - of the f. DO NOT WANT.
Re:And Google does it again! (Score:5, Interesting)
But you don't need to believe me, you can believe your own eyes. This [uol.com.br] is the 13R station and This [unetral.com.br] is a real BR station.
Re: (Score:3, Informative)
You keep using that term. I do not think it means what you think it means.
Second world [wikipedia.org]:
The term "Second World" is a phrase that was used to describe the Communist states within the Soviet Union's sphere of influence.
(...)
Additionally, the term is often used incorrectly, to describe a moderately developed country. This is most likely based on the misconception that the First World refers to the developed world, the Thi
Re:And Google does it again! (Score:5, Insightful)
Re: (Score:3, Funny)
Correction:
That is precisely why I avoid Arial and its ilk whenever possible.
:)
Re: (Score:2, Insightful)
Aside from the privacy issue, I simply wouldn't want to double the web traffic on my system.
Re:And Google does it again! (Score:5, Informative)
Re: (Score:2)
Um, downloading a definition file isn't exactly magic. Anti-virus companies have been doing it for years. So yes, actually, I would have expect that every few days my browser runs off and gets the latest phishing definition file (maybe every ti
Re: (Score:3, Interesting)
Given that the phishing site goes up when the spam goes out, you'd want information much fresher than that. I imagine a phishing site's only good for a few hours after you send out the "bait". I occasionally check out phishing sites I get in my spam, and it seems that a lifetime of a few hours is typical. I think the banks/etc. are getting faster at getting them taken down.
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Informative)
Personally, I'm OK with the trade off, although the likelihood of me being taken by a phishing site is small.
Re:And Google does it again! (Score:4, Insightful)
With only the IP address, they would only know the server.
And given that most of these phishing sites seemed to be an PC on a broadband connection (botnet?), they only really need to know the IP address.
Re: (Score:2)
Re: (Score:2)
Also, if someone is generating random characters at the end of each URL they send out as a spam email, then has
Re: (Score:3, Informative)
Now please forward that information to....everyone else in this thread.
Thx
Re: (Score:2, Insightful)
I think it's quite fair give some info about my mail, searches, and browsing history to Google in exchange for a great search engine and virtually unlimited e-mail space.
Re: (Score:2)
For the same reason many anti-virus vendors have free versions of their products that they keep up to date for free: it reduces the overall infection rate and makes the internet a generally safer place.
I'm willing to exchange some small information for this service if it were so asked, but I'm not going to exchange my mail or searches for it. I might exchange my browsing histor
Re:And Google does it again! (Score:4, Interesting)
Re: (Score:2)
It's kind of funny. Ten years ago Netscape 4 started to incorporate features for the benefit of AOL and in the process ignored a mindset that focused on the user. As a result it turned into the worlds buggiest browser. Now here we have the descendant of Netscape incorporating features for the benefit of Google and curiously enough turning into the world's bug
Re:And Google does it again! (Score:4, Interesting)
Are there answers to his question in the EULAs? Should we pay careful attention to Terms of Service and Privacy Policies before agreeing to the terms? I think so. Even the "do no evil" guys can do evil and call it good.
Re: (Score:3, Insightful)
I'm not holding my breath, particularly not with the people around Slashdot.
Re: (Score:2)
On every machine I've installed IE7 on, the first time you hit a page in the internet, it pops up and asks you if you want to turn antiphishing on.
Microsoft also claims [microsoft.com] that it's off by default:
"Automatic checking of all websites by Phishing Filter is off by default. Phishing Filter can be turned on and off from the Internet Explorer Tools menu. For example, to turn off automatic checking of all websites:"
Well.. (Score:2, Insightful)
Re: (Score:3, Interesting)
Like every other feature I think you should be given the option of choosing where you get taken to, if anywhere. For example if I have my own anti-phishing web site then I should be able to choose that.
I support Google for many things, but I am getting more insecure about their privacy issues.
Re: (Score:2)
How about potentially many megabytes, updated daily (if not more frequently) as zombies go up and down. Storing it on the client side would be a huge resource drain with infrequent hits. Spammers know well enough to keep changing URLs as soon as they start getting picked up by filters; the list would have to update as fast as the zombienet can find a new host.
It's possible, but it'd be a massive heavyweight way of doing things that'd require an always-on high-speed connection to work. I
Does a master list exist? (Score:3, Insightful)
There is no secret to why Mozilla Firefox wants this feature. I suspect Google has agreed to pay then for the feature to be in Firefox, as I would think this data would be quite lucrative....
Re:Does a master list exist? (Score:5, Informative)
Re: (Score:3, Interesting)
Re:Does a master list exist? (Score:5, Interesting)
Not new. (Score:5, Informative)
Re:Not new. (Score:4, Insightful)
No kidding (Score:4, Informative)
The article is about as informative as one of those "Your computer is broadcasting an IP Address!" banners.
For the record:
Re:Not new. (Score:4, Informative)
[ ] Tell me if the site I'm visiting is a suspected forgery
(*) Check using a downloaded list of suspected sites
( ) Check by asking [Google] about each site I visit
And heck, when I try to enable Check by asking Google... a window asking me to accept or reject the terms of service comes up! It says exactly this:
"If you choose to check with Google about each site you visit, Google will receive the URLs of pages you visit for evaluation. When you click to accept, reject, or close the warning message that Phishing Protection gives you about a suspicious page, Google will log your action and the URL of the page. Google will receive standard log information, including a cookie, as part of this process. Google will not associate the information that Phishing Protection logs with other personal information about you. However, it is possible that a URL sent to Google may itself contain personal information. Please see the Google Privacy Policy for more information."
With two choices, accept or reject the terms of service, or I can cancel and it leaves it on my previous setting.
I wonder if Firefox 3 does the same, eh?
Uhh, how ELSE are you going to do this? (Score:5, Insightful)
It changes too fast, and is too large, for it to be stored locally.
So SOMEBODY needs to provide a database interface to it, and unless you are willing to tolerate the voodoo cryptography and serious performance penalty to do privacy-preserving searches, how else is this supposed to be done?
Re:Uhh, how ELSE are you going to do this? (Score:4, Interesting)
Re: (Score:2)
I like it.
Re: (Score:2)
You can also say that the internet "changes too fast" and is "too large, for it to be stored locally" yet we don't have a single service provider solution for the internet as a whole. Rather it is a network or a collection of systems.
One alternative is to try the peer approach. It works exactly as it does in real life. You often find people asking friends about recommendations and experiences with various things like restaurants. The same concept can be applied to websites but done internally by the sof
Re: (Score:3)
Google could then look that up in their database, then return known phishing URLs hashed with another method. The browser could then check to see if the URL also matches with the second hash returned.
Re: (Score:3)
Re: (Score:2)
Re: (Score:2)
Why the concern? (Score:4, Insightful)
What will this mean? Probably that google will continue to improve their search engines, their advertising programs and other services, and they will all stay free.
Damn, go smoke some more pot, your not paranoid enough.
Re: (Score:2)
Why is everyone so concerned about criminal activities online? they already deal with drugs, arms, extortion, waste recycling...
Re: (Score:2)
Because they do evil.
Re: (Score:2, Funny)
Re: (Score:2)
Or how about the US Government deciding to execute a gigantic dragnet and grab everyone who has read Al-Jazeera and posted something somewhere that says that "we deserved to get
Re: (Score:2)
See #1. Or refer to "paranoid nutcases."
Re: (Score:2)
coming soon to a web browser near you it's GSoul. Why sing away your should to just anybody. Choose the best. Choose Google*!
*offer void where prohibited. Google promises not to do anything it considers evil with your soul. Google reserves the right to eat your soul. In the states of Utah and Nevada Google may also take
Re: (Score:2)
Give me your URL history, combine it with your online purchase and reading history and a decent psychologist (or psych AI) can probably tell you what color shirt you are wearing today.
The government understands this theory. It is why you can certain FOI requests get denied and others allowed. Not that the information you are re
The concern. (Score:5, Insightful)
The way the laws are these days, even if you're Mother Teresa, you're probably doing something illegal, even if you don't think of it as illegal or even realize it. (Ever downloaded VLC or Handbrake? Bought discount smokes? Played a little online poker? Bought something without paying your state's sales tax?) Sure, the FBI normally has bigger fish to fry than you and me, but there's no reason that'll always be the case. The tools that are used for terrorism now will be used for narcotics tomorrow, and copyright enforcement the day after that, and eventually it'll trickle down until it's being used against something you're doing. And information compiled in databases has a tendency to stick around (at least, when it's not being misplaced or stolen). Your browsing habits today could come back to seriously haunt you in a decade or two.
And it's not just the government that you have to worry about, or Google's official policy as a corporation. You also have to consider how much the people who actually deal with this data are paid. How much would it cost to get one of them to give someone malicious access to the database? A whole lot less than the database would be worth, I suspect. Even if you're not doing anything illegal (which, again, I doubt; most people break a half-dozen laws before they get to work in the morning), you're a rare person if there's not something going on in your life that you'd prefer to keep private. Medical conditions, sexual preferences
There aren't really any analogues in the pre-computer world to the size and scope of databases like Google's, in terms of both the breadth and depth of information it could contain on individuals. This is not something that we have much societal experience with, and the limited track record we do have is decidedly mixed. It's not especially paranoid to want to take a "wait and see" approach.
Re: (Score:2)
The main point of maintaining my privacy, in regard to what I read, is simply the fact that I have no way to know what may later be deemed "undesirable". Do I think that "they" are out to get me? No. But I have read enough history to realize that, if we are ever unlucky enough to have a government, or persons within our government who were interested in suppressing a particular group or point of view, that they will quickl
Re: (Score:2)
Already there (Score:5, Informative)
It's already in the version of Firefox I'm using, 2.0.0.6 downloaded directly from Mozilla's web site. In fact you've got the choice to enable it or leave it disabled, and if you enable it you've got the choice between downloading a list and doing the check internally or checking each URL interactively with a service (currently Google's the only one in the list, but more could easily be added).
Re: (Score:3, Interesting)
Re:Already there (Score:5, Interesting)
Because http://thief.com/login.html [thief.com] and http://thief.com/Login.html [thief.com] both hash to radically different values, but both have in the plaintext a characteristic fingerprint of a phishing attempt. A service that gets the plaintext can trivially identify both, but a service that only gets a hash would be fooled by the second if it only had seen the first before.
Re: (Score:2)
Bah. SlashDot mangled the URLs, there's supposed to be a "www.bankofamerica.com@" in front of the "thief.com".
Re: (Score:2)
No, just that he can change his URLs at will. Note that URLs do not name files in a filesystem, that's merely one common way of implementing things. I've got a Web server that's at the opposite extreme: all URLs are equivalent to "/" and get handled identically (a 404 error gets returned) and there's no filesystem backing at all.
Oh my GOD! (Score:5, Funny)
Everybody panic!
Re: (Score:3, Insightful)
the unarticle... (Score:5, Funny)
Oh wait, no it doesn't... You might still get cancer though...
Really a fair deal? (Score:5, Insightful)
But does the "enable" interface inform the user that Google gets their browsing history as a side-effect of providing the blacklist?
Re:Really a fair deal? (Score:4, Informative)
Re:Really a fair deal? (Score:4, Informative)
FYI, here's the text in the popup for Firefox 2.0.0.7:
If you choose to check with Google about each site you visit, Google will receive the URLs [google.com] of pages you visit for evaluation. When you click to accept, reject, or close the warning message that Phishing Protection gives you about a suspicious page, Google will log your action and the URL of the page. Google will receive standard log information [google.com], including a cookie, as part of this process. Google will not associate the information that Phishing Protection logs with other personal information about you. However, it is possible that a URL sent to Google may itself contain personal information. Please see the Google Privacy Policy [google.com] for more information.
Hash (Score:2, Insightful)
Salt won't help you. (Score:5, Informative)
It makes no sense here. It would prevent a third-party from intercepting your browsing history -- but then, they can do that anyway, by simply being your ISP.
But if Google has the list of malware sites, obviously they know that foo.com resolves to a particular hash (with a particular salt). The only way this could possibly work is if Google stored a separate list for each user, each with its own salt, which would still require you trusting Google to be doing this and not to be keeping a mapping of hash+salt -> website.
There is no way hashes can solve this problem. The only solution is to either be smart, so you don't need a blacklist, or to download the entire blacklist periodically, which is an option, but not everyone likes it.
Oh joy. (Score:2)
Am I the only one who remembers The Kitchen Sink [mozilla.org]? Adding stuff like this into a pure vanilla install is ridiculous. I don't care if they want to make
Re:Oh joy. (Score:4, Insightful)
I would agree that it is annoying for me as well though - I do not need the help of the browser to ward off phishing, especially at the cost of a performance hit. That said, Firefox is not a pet project of the geek world anymore. FF is aggressively seeking the mind and market share of the everyday user, so they must produce a product those users want. Outside of security, what is the real benefit of abandoning IE6 and more importantly IE7? Pages rendering correctly/standard compliance is not an issue with the average user, not in the least. So that only really leaves security, interface/usability, and I suppose can throw in the great extension selection as a motivator to switch as well. This is a move in the direction of better security to offer its users who value it.
toolbar (Score:2)
WordPress Now FireFox (Score:2)
Old troll. (Score:2)
"May as well be closed"? Maybe, if no one outside the development team looks at it. But the difference is between a diverse development team, everyone paid by a different group, some not paid at all for their Firefox work, and a single, homogeneous team, working for one company, who may not even care what spyware goes in.
By the way, if you'd bothered to check, this featur
Get a clue (Score:2, Insightful)
[X] Check using a downloaded of suspected sites
[ ] Check by asking [Google,
Also saves your bandwidth.
Clueless users don't change defaults (Score:5, Insightful)
This is Idiotware (Score:2)
The best thing they could do, IMO, is to render every
Re: (Score:2)
First, realize the feature is disabled by default, and can be enabled without sending your browsing history to Google. Also, it's fairly likely it will let you visit those sites, it'll just prompt you first.
Actually, they are, intelligently, realizing that your average IT department doesn't have the resources to educate users properly, and some of those users are fu
Re: (Score:2)
But we are certain to hear techies ramble on to their acquaintances about clicking that checkbox in preferences, instead of telling them to keep looking at the domain (the latter being the only way to truly safeguard yourself in the longrun anyway).
Any IT dept who pushes this is stupid, because they are leaking internal employee activities to an external site.
and some of those users are fundamentally un-educatable.
Then you are part of the problem, and given your level of knowledge implied by your p
Did I miss the memo? (Score:5, Informative)
Wait, maybe it's sending server dumps and some developer said "if you don't like it, fork it." That must be it.
Do we get a "this is a non-story" correction to this post too?
Re:Did I miss the memo? (Score:4, Informative)
The feature itself may not be new, but the implementation certainly seems to be.
Re: (Score:3, Funny)
How about... (Score:2)
and explorer beams your urlz to microsoft (Score:2, Insightful)
Slashot getting more idiots or more trolls? (Score:2)
This should have been a plug-in (Score:2)
Plus as people are pointing out, why the #!()%/)#(/%(#/! is it sending info *to* google? You should retrieve an updated list of those sites to *your* computer where it is checked. Imagine what they could do with this technology in let's say... China? Yes, not so much fun anymore is it? How about the feds?
How come the Firefox developers came to agree to this in the first plac
Oh yeah, THEY'RE reliable. (Score:2)
Until Google stops doing business with outright criminals, I'm not going to trust them to tell me who is a criminal and who is legitimate.
Wow, just wow... (Score:4, Insightful)
We're plumbing the depths of journalism today (Score:4, Insightful)
Could Slashdot editors please have a group discussion about accuracy and integrity in journalism? First it was the WordPress piece, that was rightly amended, and now there's this. Both deal with a fear that "someone" is spying on us. Anyone who deals with computer security deals with that fear on a regular basis, but those fears should not be expressed in the journalism: Facts should.
As many have mentioned, this feature can be found in the Firefox 2.0.0.7 security tab under "Tell me if the site I'm visiting is a suspected forgery." The summary is flat-out misleading, and contains links to a general page about all Firefox 3 features (which does not mention Google in the slightest), and the entire discussion about Firefox 2 memory leaks, not the relevant posts the author seems to reference.
There literally is no "FA" to "R" in the first place, and the summary is inaccurate, not only in its facts, but because it is summarizing nothing.
This editorial behavior gives Slashdot a bad name, and moves it a step towards the irrelevancy of The National Inquirer. I've been bringing buckets of salt to take with this site in the past weeks, and would like to see these trends reversed.
Please discuss it.
(I've shut off the Karma bonus on this post, it should fly on its own merits. I'm not posting "AC," because if I'm out of line here, I'm willing to pay the price for it.)
--
Toro
Well... (Score:4, Insightful)
Is anyone surprised? How is it evil? The evil would only come from the data being misused. Obviously they NEED the data, or rather, the dudes running the database need it. That's not the evil part.
Re: (Score:3, Interesting)
Yes, if you assume that the only active protection is a 1:1 URL-to-badness mapping. That may be accurate right now, I'm not sure, but it likely won't last very long.
For example, I probably wouldn't blacklist aol.com for some phishing pages on their domains because it's casting too large a net, but I might well do it for pages on evilhackerzphishingyourssn.com. It's trivial to set up anyrandomcombination.somedomain
Phishing detection by unique URL no longer works. (Score:5, Informative)
It's not really enough to just check the URL against some phishing database. The phishing sites now use unique URLs for each phish going out. Some even use unique subdomains. An example is http://onlinesession-949076872.natwest.com.nigy3r.cn.
We've been struggling with this for SiteTruth [sitetruth.com], which, among other things, uses PhishTank's data. Originally, we used PhishTank's online query API, but that required an exact match on the URL, which was useless. Now we download their entire database every few hours and blacklist the entire base domain (what you buy from a domain registrar) if there's a verified, active phishing site anywhere in the domain.
That seems reasonable enough. But there's collateral damage. So, most days, we have AOL, Microsoft Live, and Yahoo blacklisted. That's because those major sites have "open redirectors" - URLs which will redirect to any specified site. For example,
A convenient, easy to use redirection script popular with phishers. Provides a URL that appears to be on AOL, but isn't. Interestingly, AOL treats as spam any email that uses their own redirector URL. [aol.co.uk] So it's only useful for attacking non-AOL users.
&rver=4.0.1532.0&lc=1033&id=64855
&ru=http:%2F%2Fby117w.bay117.mail.live.com%2Fmail%2Flogout.aspx%3Fredirect%3Dtrue
%26logouturl%3Dhttp:%2F%2F62.49.9.117:443/HB.onlineserv.cgi/
The "logout" page for Microsoft Live can be abused, with some effort, to make it appear as if some hostile site is on Microsoft Live. This looks like Microsoft tried "security through obscurity" and failed.
_ylu=X3oDMTE2ZXYybGFuBGNvbG8DdwRsA1dTMQRwb3MDMQRzZWMDc3IEdnRpZANpMDIxXzQ3/SIG=15j5u6auo/
EXP=1140214114/**http://hticketing.com/www.bankofamerica.com/sslencrypt218bit/online_banking/
A Yahoo redirector URL intended to create the illusion of a Bank of America site. It may be possible to exploit this as a cross site scripting attack. [xssed.com]
These were all active phishing sites an hour or two ago.
Yes, arguably the intelligent user should be able to visually parse the URLs above and realize that they're not really on the sites indicated. Or notice that a redirection took place. But most users don't notice that. Neither do many anti-phishing tools, especially if the attacker combines both techniques described above.
Phishing has reached the point that if you have an open redirector or proxy on your web site, someone will use it to borrow your reputation for their scam. Open redirectors are now like open mail relays - a nice Internet feature that had to be shut down because of exploits.
So fix those open redirectors, people, or expect to be listed as a phishing-friendly site.
Re: (Score:2)
I imagine it gives a pretty good idea, but something like this would allow pretty easy creation of an alexa competitor (which is kind of different data). For example, I have slashdot bookmarked. I usually don't ever search for it.