Covert Web-to-App Tracking via Localhost on Android

Viewed 58
The article discusses the risks of web applications utilizing localhost for tracking user behavior on Android devices. It highlights a specification aimed at blocking these tracking methods that has received backing from major browsers like WebKit and Mozilla, although it is currently on hold due to compatibility issues. The threat posed by unauthorized access to local network resources is emphasized, particularly for malicious tracking. Additionally, tools like uBlock Origin and the Port Authority extension are noted for enhancing user privacy by blocking these requests. User comments express concern over the evident shortcomings in browser security regarding this issue and suggest pooling resources to create more robust solutions. Suggestions for regulatory action to enforce privacy standards are also discussed.
0 Answers