<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: sidechannel</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/sidechannel.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2018-06-01T14:54:30+00:00</updated><author><name>Simon Willison</name></author><entry><title>Side-channel attacking browsers through CSS3 features</title><link href="https://simonwillison.net/2018/Jun/1/side-channel-css3/#atom-tag" rel="alternate"/><published>2018-06-01T14:54:30+00:00</published><updated>2018-06-01T14:54:30+00:00</updated><id>https://simonwillison.net/2018/Jun/1/side-channel-css3/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="https://www.evonide.com/side-channel-attacking-browsers-through-css3-features/"&gt;Side-channel attacking browsers through CSS3 features&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Really clever attack. Sites like Facebook offer iframe widgets which show the user’s name, but due to the cross-origin resource policy cannot be introspected by the site on which they are embedded. By using CSS3 blend modes it’s possible to construct a timing attack where a stack of divs layered over the top of the iframe can be used to derive the embedded content, by taking advantage of blend modes that take different amounts of time depending on the colour of the underlying pixel. Patched in Firefox 60 and Chrome 63.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/css3"&gt;css3&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sidechannel"&gt;sidechannel&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/timing-attack"&gt;timing-attack&lt;/a&gt;&lt;/p&gt;



</summary><category term="css3"/><category term="security"/><category term="sidechannel"/><category term="timing-attack"/></entry><entry><title>Side-Channel Leaks in Web Applications</title><link href="https://simonwillison.net/2010/Mar/23/sidechannel/#atom-tag" rel="alternate"/><published>2010-03-23T16:24:02+00:00</published><updated>2010-03-23T16:24:02+00:00</updated><id>https://simonwillison.net/2010/Mar/23/sidechannel/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.freedom-to-tinker.com/blog/felten/side-channel-leaks-web-applications"&gt;Side-Channel Leaks in Web Applications&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
Interesting new security research. SSL web connections encrypt the content but an attacker can still see the size of the HTTP requests going back and forward—which can be enough to extract significant pieces of information, especially in applications that make a lot of Ajax requests.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/ajax"&gt;ajax&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/http"&gt;http&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sidechannel"&gt;sidechannel&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/ssl"&gt;ssl&lt;/a&gt;&lt;/p&gt;



</summary><category term="ajax"/><category term="http"/><category term="security"/><category term="sidechannel"/><category term="ssl"/></entry><entry><title>Side-Channel Attacks and Security Theatre</title><link href="https://simonwillison.net/2007/Aug/2/links/#atom-tag" rel="alternate"/><published>2007-08-02T12:30:03+00:00</published><updated>2007-08-02T12:30:03+00:00</updated><id>https://simonwillison.net/2007/Aug/2/links/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://www.links.org/?p=245"&gt;Side-Channel Attacks and Security Theatre&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
“In order to mount most of these attacks the attacker must be local [...] every good security person knows that if your attacker has the ability to run stuff on your machine, it is game over, so why are we even caring about these attacks?”


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/ben-laurie"&gt;ben-laurie&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/openssl"&gt;openssl&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/securitytheatre"&gt;securitytheatre&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/sidechannel"&gt;sidechannel&lt;/a&gt;&lt;/p&gt;



</summary><category term="ben-laurie"/><category term="openssl"/><category term="security"/><category term="securitytheatre"/><category term="sidechannel"/></entry></feed>