Firefox containers and good browser hygiene can, but if you slip up...
Firefox containers and good browser hygiene can, but if you slip up...
> How this de-anonymization attack works is difficult to explain but relatively easy to grasp once you have the gist. Someone carrying out the attack needs a few things to get started: a website they control, a list of accounts tied to people they want to identify as having visited that site, and content posted to the platforms of the accounts on their target list that either allows the targeted accounts to view that content or blocks them from viewing it—the attack works both ways.
> Next, the attacker embeds the aforementioned content on the malicious website. Then they wait to see who clicks. If anyone on the targeted list visits the site, the attackers will know who they are by analyzing which users can (or cannot) view the embedded content.
> The attack takes advantage of a number of factors most people likely take for granted: Many major services—from YouTube to Dropbox—allow users to host media and embed it on a third-party website. Regular users typically have an account with these ubiquitous services and, crucially, they often stay logged into these platforms on their phones or computers.
Isn't this one of the older forms of de-anonymization? And this is pretty visible to the user too, embeds hint to even non-technical people they can be tracked across websites.
That said there are things they could do to prevent this. They won't do them, it'd be costly research... But they could.
I didn't know the authors had no intention of not doing anything with the repo. In which case it's just someone trolling. Which is also not a big deal.
OSS is a free thing. They can do what they want.
2.
Plenty of examples of 3 letter agencies abusing their powers if you search.
EFF, reason.com, and the register usually make a point of reporting on it.
eg: https://www.eff.org/wp/patterns-misconduct-fbi-intelligence-...
https://reason.com/2023/05/17/the-durham-report-is-right-abo...
For example spying on (ex) girlfriends, seeing people in various state of undress (cameras in devices) etc.
https://www.eff.org/deeplinks/2015/01/government-releases-do...
The FBI actually recently purchased a bunch of this kind of data because the governments restrictions would t allow for it any other way.
Completely removing noise is difficult-to-impossible. Attenuating the noise enough to impart a new noise pattern is much easier, though (not saying it's easy, just easier).
I did this sort of thing decades ago as part of larger system used for research.