zlacker

[parent] [thread] 1 comments
1. stevew+(OP)[view] [source] 2022-06-15 12:13:55
Thanks for providing the original RFC, though reading it I find it to be much worse than I thought because of its ability to detect actions per client.

Now there’s a bunch of crypto to prevent the identification of an individual device, but websites would still be able to track your actions even if you disabled cookies, localStorage etc. (apart from the current ways such as like Etag tracking or browser fingerprinting) except that you can’t really mitigate it in any way. Whichever way you put this, PATs are not something that would preserve users’ security or privacy.

I also disagree with you that this isn’t a form of DRM - you’d still need some kind of TPM or another embedded electronic device that helps with these attestations. However, once attackers try to buy thousands of such devices to attack/scrape websites, websites would naturally use the originating vendor as the basis for allowing/denying actions. Which ultimately comes down to DRM - you’d see Windows, Android and Apple devices being allowed - and Linux/BSD/rooted Android/custom ROMs being left out to dry.

replies(1): >>nojito+hg
2. nojito+hg[view] [source] 2022-06-15 13:48:13
>>stevew+(OP)
> but websites would still be able to track your actions even if you disabled cookies, localStorage etc. (apart from the current ways such as like Etag tracking or browser fingerprinting) except that you can’t really mitigate it in any way. Whichever way you put this, PATs are not something that would preserve users’ security or privacy.

The website doesn't receive any info other than the URL you are visiting and the fact you have an authenticated PAT.

Not entirely sure where you’re getting your information from.

[go to top]