{"id":2628,"date":"2010-03-24T08:19:30","date_gmt":"2010-03-24T08:19:30","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=2628"},"modified":"2015-09-09T19:37:39","modified_gmt":"2015-09-09T11:37:39","slug":"website-auto-complete-leaks-data-even-over-encrypted-link","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2010\/03\/website-auto-complete-leaks-data-even-over-encrypted-link\/","title":{"rendered":"Website Auto-complete Leaks Data Even Over Encrypted Link"},"content":{"rendered":"

I’m always fascinated by side-channel<\/a> attacks where the attack is focused on the underlying architecture of the cryptosystem and the data echos it creates rather than the algorithm or implementation itself. Similar somewhat to the recent breaking of OpenSSL using power fluctuations<\/a>.<\/p>\n

This time some researcher type fellas focused on the digital noise autocomplete webforms make over an encrypted connection and how it can expose some pretty sensitive data such as medical histories, income, search queries and more.<\/p>\n

Google, Yahoo, Microsoft’s Bing, and other leading websites are leaking medical histories, family income, search queries, and massive amounts of other sensitive data that can be intercepted even when encrypted, computer scientists revealed in a new research paper.<\/p>\n

Researchers from Indiana University and Microsoft itself were able to infer the sensitive data by analyzing the distinct size and other attributes of each exchange between a user and the website she was interacting with. Using man-in-the-middle attacks, they could glean the information even when transactions were encrypted using the Secure Sockets Layer, or SSL, protocol or the WPA, or Wi-fi Protected Access protocol.<\/p>\n

“Our research shows that surprisingly detailed sensitive user data can be reliably inferred from the web traffic of a number of high-profile, top-of-the-line web applications” offered by Google, Yahoo, and Bing as well as the leading online providers of tax, health and investments services, which the researchers didn’t name.<\/p><\/blockquote>\n

There’s a lot of inference going on but from what I understand of the attack it would only get more accurate as they collected more data and refined the pattern matching. <\/p>\n

The attack can succeed over SSL (https connections) or WPA encrypted wireless sessions.<\/p>\n

It’s like a rather complex puzzle piecing together different snippets of meta data to come out with an answer, which so far seems to be working well.<\/p>\n