zlacker

[parent] [thread] 4 comments
1. helloj+(OP)[view] [source] 2023-07-25 20:55:06
I'm less concerned with reversing hashes and more concerned with tracking via the attlestation provider.

What is stopping them from recording the value returned to you that is then passed to the site you tried to visit? Does the data provided to the integrity checker allow for identification? Could the original vendor pass some value to use in the integrity check to prevent replay attacks, and could that value itself encode your personal information?

replies(1): >>Avaman+3j
2. Avaman+3j[view] [source] 2023-07-25 22:28:07
>>helloj+(OP)
> What is stopping them from recording the value returned to you that is then passed to the site you tried to visit?

> Could the original vendor pass some value to use in the integrity check to prevent replay attacks, and could that value itself encode your personal information?

Well that value is most likely a cryptographic signature, a "challenge" or a combination of both. Unless there's some separate payload you can't really hide arbitrary data in hashes/signatures that would be used in such a process.

In the end "could" is a very loose word, PII as such is not really part of the process. In this current (Apple's PAT) case, the information is "you have an Apple device", can't currently hide anything else in that.

replies(1): >>helloj+zw
◧◩
3. helloj+zw[view] [source] [discussion] 2023-07-25 23:59:59
>>Avaman+3j
Thanks for the response. As a second question, would what prevent someone with an "approved" apple device from firing off a bunch of token requests and then distributing those tokens to different entities for those entities to submit to the origin to pass the validation test?
replies(1): >>Avaman+Po1
◧◩◪
4. Avaman+Po1[view] [source] [discussion] 2023-07-26 08:43:24
>>helloj+zw
They could, but I'm sure there are rate-limits in place against that.
replies(1): >>helloj+v42
◧◩◪◨
5. helloj+v42[view] [source] [discussion] 2023-07-26 13:28:17
>>Avaman+Po1
Good to know. And the rate limits themselves have to apply to user agents in the old style, right? Because there is no identifying information apart from current browser fingerprinting methods. If abused, do we foresee captchas having to be placed as a guard against attlestation abuse?
[go to top]