Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/jonasstrehle/supercookie

⚠️ Browser fingerprinting via favicon!
https://github.com/jonasstrehle/supercookie

browser browser-fingerprint browser-fingerprinting chrome cookie edge express favicon fingerprint firefox html identification javascript nodejs privacy safari security supercookie tracking typescript

Last synced: 25 days ago
JSON representation

⚠️ Browser fingerprinting via favicon!

Awesome Lists containing this project

README

        



supercookie




Documentation




Website Status


License




Fingerprint index


N Redirects

**Supercookie** uses favicons to assign a unique identifier to website visitors.

Unlike traditional tracking methods, this ID can be stored almost persistently and cannot be easily cleared by the user.

The tracking method works even in the browser's incognito mode and is not cleared by flushing the cache, closing the browser or restarting the operating system, using a VPN or installing AdBlockers. 🍿 [Live demo](https://supercookie.me).

## About

### 💭 Inspiration

- Paper by Scientists at University of Illinois, Chicago: [www.cs.uic.edu](https://www.cs.uic.edu/~polakis/papers/solomos-ndss21.pdf)
- Article by heise: [heise.de](https://heise.de/-5027814)

### 🌱 Purpose

This repository is for **educational** and **demonstration purposes** only!

The demo of "supercookie" as well as the publication of the source code of this repository is intended to draw attention to the problem of tracking possibilities using favicons.

📕 [Full documentation](https://supercookie.me/workwise)

## Installation

### 🔧 Docker
**requirements**:
[Docker daemon](https://docs.docker.com/get-docker/)

1. Clone repository
```bash
git clone https://github.com/jonasstrehle/supercookie
```

2. Update .env file in [supercookie/server/.env](https://github.com/jonasstrehle/supercookie/blob/main/server/.env)
```env
HOST_MAIN=yourdomain.com #or localhost:10080
PORT_MAIN=10080

HOST_DEMO=demo.yourdomain.com #or localhost:10081
PORT_DEMO=10081
```

3. Run container
```bash
cd supercookie/server
docker-compose up
```

-> Webserver will be running at https://yourdomain.com

### 🤖 Local machine
**requirements**:
[Node.js](https://nodejs.org/)

1. Clone repository
```bash
git clone https://github.com/jonasstrehle/supercookie
```

2. Update .env file in [supercookie/server/.env](https://github.com/jonasstrehle/supercookie/blob/main/server/.env)
```env
HOST_MAIN=localhost:10080
PORT_MAIN=10080

HOST_DEMO=localhost:10081
PORT_DEMO=10081
```

3. Run service
```bash
cd supercookie/server
node --experimental-json-modules main.js
```

-> Webserver will be running at http://localhost:10080

## Workwise of [supercookie](https://supercookie.me/workwise)

### [📖 Background](https://supercookie.me/workwise#content-background)

Modern browsers offer a wide range of features to improve and simplify the user experience.
One of these features are the so-called favicons: A favicon is a small (usually 16×16 or 32×32 pixels) logo used by web browsers to brand a website in a recognizable way. Favicons are usually shown by most browsers in the address bar and next to the page's name in a list of bookmarks.

To serve a favicon on their website, a developer has to include an attribute in the webpage’s header. If this tag does exist, the browser requests the icon from the predefined source and if the server response contains an valid icon file that can be properly rendered this icon is displayed by the browser. In any other case, a blank favicon is shown.

```html

```

The favicons must be made very easily accessible by the browser. Therefore, they are cached in a separate local database on the system, called the favicon cache (F-Cache). A F-Cache data entries includes the visited URL (subdomain, domain, route, URL paramter), the favicon ID and the time to live (TTL).
While this provides web developers the ability to delineate parts of their website using a wide variety of icons for individual routes and subdomains, it also leads to a possible tracking scenario.

When a user visits a website, the browser checks if a favicon is needed by looking up the source of the shortcut icon link reference of the requested webpage.
The browser initialy checks the local F-cache for an entry containing the URL of the active website. If a favicon entry exists, the icon will be loaded from the cache and then displayed. However, if there is no entry, for example because no favicon has ever been loaded under this particular domain, or the data in the cache is out of date, the browser makes a GET request to the server to load the site's favicon.

### [💣 Threat Model](https://supercookie.me/workwise#content-threat-model)

In the article a possible threat model is explained that allows to assign a unique identifier to each browser in order to draw conclusions about the user and to be able to identify this user even in case of applied anti-fingerprint measures, such as the use of a VPN, deletion of cookies, deletion of the browser cache or manipulation of the client header information.

A web server can draw conclusions about whether a browser has already loaded a favicon or not:
So when the browser requests a web page, if the favicon is not in the local F-cache, another request for the favicon is made. If the icon already exists in the F-Cache, no further request is sent.
By combining the state of delivered and not delivered favicons for specific URL paths for a browser, a unique pattern (identification number) can be assigned to the client.
When the website is reloaded, the web server can reconstruct the identification number with the network requests sent by the client for the missing favicons and thus identify the browser.



Supercookie Header




conventional cookies


supercookie






Identification accuracy
-
100%


Incognito / Private mode detection




Persistent after flushed website cache and cookies




Identify multiple windows




Working with Anti-Tracking SW



### [🎯 Target](https://supercookie.me/workwise#content-target)

It looks like all top browsers ( [Chrome](https://google.com/chrome/), [Firefox](https://www.mozilla.org/en-US/firefox/new/), [Safari](https://www.apple.com/safari/), [Edge](https://www.microsoft.com/edge/)) are vulnerable to this attack scenario.

Mobile browsers are also affected.

#### Current versions



Browser


Windows


MacOS


Linux


iOS


Android


Info




Chrome (v 111.0)



?

-


Safari (v 14.0)
-

-

-
-


Edge (v 87.0)





-


Firefox (v 86.0)





Fingerprint different in incognito mode


Brave (v 1.19.92)





-

#### Previous versions



Browser


Windows


MacOS


Linux


iOS


Android


Info




Brave (v 1.14.0)





-


Firefox (< v 84.0)





-

### [⚙ Scalability & Performance](https://supercookie.me/workwise#content-scalability-performance)

By varying the number of bits that corresponds to the number of redirects to subpaths, this attack can be scaled almost arbitrarily.
It can distinguish 2^N unique users, where N is the number of redirects on the client side.
The time taken for the read and write operation increases as the number of distinguishable clients does.


In order to keep the number of redirects as minimal as possible, N can have a dynamic length.
More about this [here](https://supercookie.me/workwise#content-scalability-performance).

### [📌How to defend against?](https://supercookie.me/workwise)

The most straightforward solution is to disable the favicon cache completely. As long as the browser vendors do not provide a feature against this vulnerability it's probably the best way to clear the F-cache.

* [Chrome](https://www.google.com/chrome/) • **MacOS**

- Delete `~/Library/Application Support/Google/Chrome/Default/Favicons`
- Delete `~/Library/Application Support/Google/Chrome/Default/Favicons-journal`

* [Chrome](https://www.google.com/chrome/) • **Windows**

- Delete `C:\Users\username\AppData\Local\Google\Chrome\User Data\Default`

* [Safari](https://www.apple.com/safari/) • **MacOS**

- Delete content of `~/Library/Safari/Favicon Cache`

* [Edge](https://www.microsoft.com/edge) • **MacOS**

- Delete `~/Library/Application Support/Microsoft Edge/Default/Favicon`
- Delete `~/Library/Application Support/Microsoft Edge/Default/Favicons-journal`

## Other

### [🙎‍♂️ About me](https://jonas.strehles.info)

I am a twenty year old student from 🇩🇪 Germany. I like to work in software design and development and have an interest in the IT security domain.

This repository, including the setup of a demonstration portal, was created within two days as part of a private research project on the topic of "Tracking on the Web".

### [💖 Support the project](https://ko-fi.com/jonasstrehle)

[![ko-fi](https://ko-fi.com/img/githubbutton_sm.svg)](https://ko-fi.com/jonasstrehle)

## Spread the world!

Liked the project? Just give it a star ⭐ and spread the world!

* [Bruce Schneier on schneier.com](https://www.schneier.com/crypto-gram/archives/2021/0315.html#cg5)
* [Matthew Gault on vice.com](https://www.vice.com/amp/en/article/n7v5y7/browser-favicons-can-be-used-as-undeletable-supercookies-to-track-you-online?__twitter_impression=true)
* [Rhett Jones on gizmodo.com](https://gizmodo.com/favicons-could-be-the-supercookie-that-tracks-you-every-1846229089/)
* [Dev Kundaliyaon on computing.co.uk](https://www.computing.co.uk/news/4027035/tiny-favicons-utilised-track-users-movements-online)
* [Barclay Ballard on techradar.com](https://www.techradar.com/news/these-tiny-icons-could-be-tracking-you-across-the-internet)
* [Discussion on ycombinator.com](https://news.ycombinator.com/item?id=26051370)
* 🇩🇪 [Andreas Proschofsky on derstandard.de](https://www.derstandard.de/story/2000124123751/supercookies-datensammler-finden-immer-neue-wege-die-nutzer-auszuspionieren)
* 🇩🇪 [Dieter Petereit on t3n.de](https://t3n.de/news/tracking-id-favicons-supercookie-1355514/)
* 🇪🇸 [ALVY on microsiervos.com](https://www.microsiervos.com/archivo/seguridad/supercookie-me-identificador-personal-imborrable-icono-favicon.html)
* 🇧🇷 [Felipe Demartini on canaltech.com.br](https://canaltech.com.br/seguranca/favicons-podem-ser-usados-para-rastrear-usuarios-online-permanentemente-178834/)
* 🇧🇬 [Daniel Despodov on kaldata.com](https://www.kaldata.com/it-%D0%BD%D0%BE%D0%B2%D0%B8%D0%BD%D0%B8/%D0%BD%D0%BE%D0%B2-%D0%BC%D0%B5%D1%82%D0%BE%D0%B4-%D0%B7%D0%B0-%D0%B8%D0%B4%D0%B5%D0%BD%D1%82%D0%B8%D1%84%D0%B8%D0%BA%D0%B0%D1%86%D0%B8%D1%8F-%D0%BD%D0%B0-%D0%BA%D0%BE%D0%BD%D0%BA%D1%80%D0%B5%D1%82-355279.html)
* 🇫🇷 [Guillaume Belfiore on clubic.com](https://www.clubic.com/navigateur-internet/actualite-353236-publicite-les-favicons-des-sites-web-pourraient-se-montrer-un-peu-trop-curieux.html)
* 🇨🇳 [study875 on cnbeta.com](https://www.cnbeta.com/articles/tech/1089095.htm)
* 🇷🇺 [ITSumma on habr.com](https://habr.com/ru/company/itsumma/blog/542734/)
* 🇷🇺 [securitylab.ru](https://www.securitylab.ru/news/516436.php)
* [Seytonic on YouTube](https://youtu.be/X7OW5hTt5hY)