Navigation
Recherche
|
Covert web-to-app tracking via localhost on Android
mercredi 11 juin 2025, 15:16 , par LWN.net
The 'Local Mess' GitHub
repository is dedicated to the disclosure of an Android tracking exploit used by (at least) Meta and Yandex. While there are subtle differences in the way Meta and Yandex bridge web and mobile contexts and identifiers, both of them essentially misuse the unvetted access to localhost sockets. The Android OS allows any installed app with the INTERNET permission to open a listening socket on the loopback interface (127.0.0.1). Browsers running on the same device also access this interface without user consent or platform mediation. This allows JavaScript embedded on web pages to communicate with native Android apps and share identifiers and browsing habits, bridging ephemeral web identifiers to long-lived mobile app IDs using standard Web APIs. This backdoor, the use of which has evidently stopped since its disclosure, allow tracking of users across sites regardless of cookie policies or use of incognito browser modes.
https://lwn.net/Articles/1024844/
Voir aussi |
56 sources (32 en français)
Date Actuelle
ven. 13 juin - 16:00 CEST
|