{"id":16930,"date":"2019-11-19T10:45:16","date_gmt":"2019-11-19T18:45:16","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/11\/19\/news-10667\/"},"modified":"2019-11-19T10:45:16","modified_gmt":"2019-11-19T18:45:16","slug":"news-10667","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/11\/19\/news-10667\/","title":{"rendered":"Opinion: Websites Ask for Permissions And Attack Forgiveness"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5dd30065ea1f420009075250\/master\/pass\/OpEd-Phone-Camera-Permissions-491752454.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lukasz Olejnik| Date: Tue, 19 Nov 2019 14:00:00 +0000<\/strong><\/p>\n<p class=\"content-header__row content-header__dek\">Web pages are increasingly powerful&#8212;asking for notifications, webcam access, or location&#8212;but this great power comes with great vulnerabilities.<\/p>\n<p>Users increasingly encounter moments when a website asks for permission to gather some personal data or <a href=\"https:\/\/www.wired.com\/story\/how-to-lock-down-websites-permissions-access-webcam\/\">access to their device hardware<\/a>: &quot;Can we access your GPS position? Your microphone or camera? Your Bluetooth? Can we send you push notifications about breaking news or premium chocolate subscription offers?&quot;<\/p>\n<p>Permissions, as these asks are known, give the web exciting powers. Already around a dozen browser features range from tapping low-level hardware and software functions like the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.w3.org\/TR\/clipboard-apis\/#clipboard-permissions&quot;}\" href=\"https:\/\/www.w3.org\/TR\/clipboard-apis\/#clipboard-permissions\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">clipboard<\/a> to the increasingly persistent ability of sites to access files on a user\u2019s disk. More are soon to come. But with great power comes more security and privacy risks. At this point, there are few viable alternatives for websites to manage access in any way other than asking users, and assuming they understand the risks involved.<\/p>\n<p>Dr. <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/lukaszolejnik.com&quot;}\" href=\"https:\/\/lukaszolejnik.com\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Lukasz Olejnik<\/a> (<a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/lukOlejnik?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor&quot;}\" href=\"https:\/\/twitter.com\/lukOlejnik?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">@lukOlejnik)<\/a> is an independent security and privacy researcher and advisor, W3C Technical Architecture Group member, and research associate at the Center for Technology and Global Affairs at Oxford University.<\/p>\n<p>These permissions are typically very easy for users to manage. When the user grants a permission, the browser often memorizes it and never asks again, for better or for <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.lukaszolejnik.com\/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api\/&quot;}\" href=\"https:\/\/blog.lukaszolejnik.com\/stealing-sensitive-browser-data-with-the-w3c-ambient-light-sensor-api\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">worse<\/a>. It&#x27;s known that users are prone to fatigue from <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.mozilla.org\/futurereleases\/2019\/11\/04\/restricting-notification-permission-prompts-in-firefox\/&quot;}\" href=\"https:\/\/blog.mozilla.org\/futurereleases\/2019\/11\/04\/restricting-notification-permission-prompts-in-firefox\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">repeated and unwanted prompts<\/a>. But in general, permissions are a good thing, allowing users to block sites from accessing sensitive data and tools, and allowing access to the trusted ones. But those data and tools might remain vulnerable. Permissions seemingly shift the responsibility of protection from browsers to individual sites, and to the users themselves who grant permissions and are generally assumed to know what they are doing. The mechanism therefore gives rise to a special relationship between site and user, one that could at some point be abused.<\/p>\n<p>Let\u2019s assume malicious hackers breach a site and gain control over its content\u2014the source code, embedded elements like images, the served scripts, even third-party scripts. This is in no way an unlikely scenario, as evidenced by past breaches of <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/slackhq.com\/new-information-2015-incident&quot;}\" href=\"https:\/\/slackhq.com\/new-information-2015-incident\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Slack<\/a>, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/security.ticketmaster.co.uk&quot;}\" href=\"https:\/\/security.ticketmaster.co.uk\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Ticketmaster<\/a>, <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.britishairways.com\/en-gb\/information\/incident\/data-theft\/latest-information&quot;}\" href=\"https:\/\/www.britishairways.com\/en-gb\/information\/incident\/data-theft\/latest-information\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">British Airways<\/a>, and many others that happen to fall victim to cyberattack targeting integrity. (Some sites are even compromised by several <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/magecart-an-overview-and-defense-mechanisms\/)%20at%20the%20%5Bsame%20time%5D(https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/11\/web-skimmers-compete-umbro-brasil-hack\/).&quot;}\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/magecart-an-overview-and-defense-mechanisms\/)%20at%20the%20%5Bsame%20time%5D(https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/11\/web-skimmers-compete-umbro-brasil-hack\/).\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">threat actors<\/a> What could they do with permissions? An awful lot. They could access any feature of any user who had granted the site access. They\u2019d turn assets into liabilities.<\/p>\n<p>Among other security and privacy issues we could imagine permission fissure ending in events like:<\/p>\n<p>Webcams and microphones could be <a href=\"https:\/\/www.wired.com\/story\/zoom-bug-webcam-hackers\/?verso=true\">unexpectedly<\/a> activated out of the blue, or attackers could abuse <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.w3.org\/TR\/webaudio\/&quot;}\" href=\"https:\/\/www.w3.org\/TR\/webaudio\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Web Audio API<\/a> to track user devices with \u201cunhearable\u201d beacons or even send data out of band.<\/p>\n<p><a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.w3.org\/TR\/notifications\/&quot;}\" href=\"https:\/\/www.w3.org\/TR\/notifications\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Notification API<\/a> or <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.w3.org\/TR\/push-api\/&quot;}\" href=\"https:\/\/www.w3.org\/TR\/push-api\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Push API<\/a> messages seeming to come from a source the user trusts could be sent with links to malware, or even display disinformation and propaganda in a coordinated manner, simultaneously to many users.<\/p>\n<p>Permissions are designed to mitigate these kinds of risks. But if a site with large user base falls victim to a supply chain attack impacting  site integrity, the protection model would completely fall apart and many features would be subject to the attackers\u2019 whims. A wave of negative press would certainly follow such a breach, especially if the attacked site was large or trusted.<\/p>\n<p>Even though none of these scenarios is known to have happened yet, as permissions become more ubiquitous, it\u2019s paramount to consider these risks at the design stage and to be as transparent with the user as possible. Can we expect users to understand the fundamental difference between granting access to an installed mobile application (often in a controlled environment) and a remote website? If not, sites should be clear about this prior to prompting for permission.<\/p>\n<p>In some cases of breach, it might not be difficult to imagine that regulatory aspects such as GDPR could become relevant. This territory is not well understood today. While it might not be clear if granting a permission means \u201cunambiguous and informed consent,\u201d it does suggest a token of trust between the user and the site, clearly communicated by the user. These decisions are explicit, even though almost no website today explains the rationale or use cases prior to asking to use a permission-gated function, a frequently seen antipattern when a random site keep asking for the ability to display notifications.<\/p>\n<p>Sites should devote extra care when requesting to use sensitive browser functionality. Specifically, one would imagine websites wanting to be sure if, when, and how permissions are used. To assess their potential exposure risk, sites should also know how many of their users have granted permissions. It is not clear if websites even think of making inventory lists of such sensitive uses today. But if there was a breach, many would likely ask these questions.<\/p>\n<p>Site operators could prepare for these kinds of dangers by knowing if sensitive mechanisms are in use, monitoring their uses, and logging which particular users signed in for permission-gated content. Website operators need to keep track of the undesirable site modifications by protecting system integrity. While this problem is a broad challenge, web-wise the use of <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.w3.org\/TR\/SRI\/&quot;}\" href=\"https:\/\/www.w3.org\/TR\/SRI\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">mechanisms<\/a> guaranteeing at the least the integrity of embedded subresources should be the norm.<\/p>\n<p>Web browsers could also help by offering simple and easy ways for users to inspect permissions granted to sites, and withdraw seamlessly. Fortunately in the last few years, browsers have made impressive progress in this area. Lastly, regulators and enforcers should work to understand the implications of this possible new relationship between users and services. As the pace of web evolution is accelerating, monitoring those changes are pressing.<\/p>\n<p>Web standardization plays a crucial role not only for <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/en.wikipedia.org\/wiki\/Web_interoperability&quot;}\" href=\"https:\/\/en.wikipedia.org\/wiki\/Web_interoperability\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">interoperability<\/a>, but also for ensuring user trust in the technology, including the security and privacy guarantees. Standardization might be seen as a form of regulating how the technology works. But if so, due to the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/blog.lukaszolejnik.com\/soft-influence-on-societies\/&quot;}\" href=\"https:\/\/blog.lukaszolejnik.com\/soft-influence-on-societies\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">increasing role technology plays in societies<\/a>, the emerging question of oversight and social control may appear sooner or later. This doesn\u2019t mean that we should invite the trend of national \u201ccybersovereignty\u201d increasingly felt in many parts of the world to impact technology standards.  It simply means we should uphold the pillars of interoperable software and hardware, which make the web, at its best, such a useful and illuminating place to be.<\/p>\n<p>WIRED Opinion <em>publishes articles by outside contributors representing a wide range of viewpoints. Read more opinions <a href=\"https:\/\/www.wired.com\/opinion\">here<\/a>. Submit an op-ed at\u00a0opinion@wired.com.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/opinion-websites-ask-for-permissions-and-attack-forgiveness\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5dd30065ea1f420009075250\/master\/pass\/OpEd-Phone-Camera-Permissions-491752454.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lukasz Olejnik| Date: Tue, 19 Nov 2019 14:00:00 +0000<\/strong><\/p>\n<p>Web pages are increasingly powerful\u2014asking for notifications, webcam access, or location\u2014but this great power comes with great vulnerabilities.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21382],"class_list":["post-16930","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-privacy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16930"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16930\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16930"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}