-
Notifications
You must be signed in to change notification settings - Fork 35
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot believe the chutzpah #21
Comments
Seconded. I don't want all my browsing traffic going through Google-controlled servers. This doesn't have anything to do with security. This is all about control, harvesting data, and ensuring Google's position as the advertising leader on the internet. |
I feel as if Google is literally taunting policy makers, politicians, privacy groups. How could such an inane thought process, be exhibited? This demonstrates how out of touch Google is, or alternatively, its sheer audacity. Google is the single greatest threat to privacy that has ever existed. Ever. Insane! |
This, in it's entirety, should be shut down today. I will be writing the FCC about this as well. Make sure you report this repo as a phishing kit to Github, because that's exactly what it is: google's phishing kit. |
Hi folks, thanks for your input. This feature tunnels traffic through two proxies (one run by Google, one by another company). That ensures that Google cannot see browsing data even if it were logging data on the proxy - which it isn't. All traffic is encrypted onion-style between Chrome and the proxies, so the Google proxy has no information about what websites are being browsed. Additionally, we're using blinded authentication tokens to minimize access to user identifiers at the proxies. So to recap, all the Google proxy can see is that an unknown client at a specific IP is using the proxy system. No information about websites visited or ads loaded is available. |
Even after having read the above comment by @DavidSchinazi , as they say, the devil is in the details. As @dfskoll has already pointed out, there will be no way, for an unsuspecting user, to know Google has not MITM'd a connection. Lets ignore the technical details for a bit and see where this leads: with this feature, google will have a veto on anyone building a competing tracking system. -- |
I'm not buying @DavidSchinazi's comment. Even if you provided public copies of the contracts and signed assurances, I still don't want my data going through those servers. "Trust us" is "black box" security. Regardless, the first hop is always going to know who I am. I don't care if it gets obfuscated by multiple hops only knowing the IP of the previous proxy. |
See also Apple's two-hop proxy feature: https://support.apple.com/en-us/102602. |
A few comments on some previous comments:
|
If the first proxy is owned by Google, it ensures no such thing. Either proxy can MITM the connection. And also, who is the "other company" and why should we trust it? |
@DavidSchinazi - Stop. Implementing. Moats. For. Google's. Ad. Business. This is not a privacy feature, this is anticompetitive BS. |
So you're saying if Google received a subpoena because someone was browsing child pornography, there's no way you could/would assist law enforcement? Yeah, right. |
Not that that's acceptable, and law enforcement should be involved. But it starts the slippery slope. Getting traffic when a murder happens is also probably a good thing. Hey--let's also go after people who skip child support. Then it's people who drive more than 5 MPH over the speed limit. If the tool is there, governments will start out by saying they will only use it to catch the "worst of the worst"...and over time they'll keep moving the goalposts. EDIT: I mean...anyone remember when you could order a rifle from a mail-order catalog? You certainly can't do that in the US now. |
To address some of the technical points made here:
|
Google owns Chrome and Google owns the proxy. There's an inherent conflict there. If Google wanted to, it could make the Chrome UI say anything it chooses.
Google can determine the original IP, which is what this whole thing is supposed to hide. Why do not not simply add support for TOR directly into Chrome and leave it at that? Then people who want to hide their IP can just enable TOR. |
@DavidSchinazi would it be possible to have a more technical spec with Diagrams of what your planning traffic routing decision tree for one would be nice.
I personally have many reservations on this giving Google this much control on a user and it's data is not my cup of tea. As honest as the teams/individual think they are being, Google is not known to play with things that are not in there interest. So I will ask the dumbest question I know will be ignored if we are planning to cut tracking and identification how will ad-sense work from that point on because we said Google will not be tracking users. |
Please do not try to imply that this has anything to do with Tor. There's a reason why Tor makes a random selection of hops, and doesn't just route everything through two big servers 'run by independent organizations'. This approach is absolutely not equivalent to that. |
What's to prevent it from doing literally anything? Why MITM when the browser itself can just steal all your data itself? |
Nothing, I guess. I'm coming around to the belief that this technology is mostly to give Google a monopoly on tracking and making it harder for anyone else to compete. (Though, getting data via a proxy makes it harder to detect something nefarious. If the browser were exfiltrating data to Google during normal browsing, the unusual traffic would be detectable.) |
Google tried to undermine the users privacy way too often in the past years - always pretending to protect users. To give you an incomplete list:
Also noticing the additional force youtube put up in the fight against adblockers, it's pretty clear where this is going to: More ads, less blocking, more insights and control of the user. And everything exclusively for google. You lost my trust when you removed "Don't be evil" from your code of conduct. This proposal has way too many possibilities for abuse. You should bury it. |
Wait until Google throttles the traffic through it's proxy that it deems to be "misinformation" like it did with YouTube during Covid or damaging to it's bottom line. |
Time to use a different browser and deGoogle the environment. Enough monopoly. Chrome, YouTube, Android, Gmail... Got to find alternatives now. |
Good point but wait! Doesn't this mean that the American government can now access people's traffic legally using the very Patriot Act? Regardless of where this data is going or coming from (even globally), now you're going through Google's server which means more US government control over the entire world. |
I think everyone should start using other Br |
Google owns Chrome. So what's to prevent it from installing its own root certificate and MITMing all of your web browsing? Even if Google is able to restrain itself from acquiring all that juicy data (HAHA! As if...), it still collects oodles of metadata about someone's browsing habits.
This is a privacy and security nightmare, and I can't believe the cynicism of the Google marketing team that calls this a "privacy-enhancing" feature.
You all should be thoroughly ashamed of yourself. "Don't be evil" is now a sick joke.
The text was updated successfully, but these errors were encountered: