Google Chrome Extensions Can Be Fingerprinted For Online Tracking

Share post:

A researcher has built a website that utilizes installed Google Chrome extensions to generate a fingerprint of the device that can be used to track the user online.

In tracking users online, it is possible to create fingerprints, or tracking hashes, using the characteristics of a device connected to a website such as GPU performance, installed Windows applications, a device’s screen resolution, hardware configuration, and the installed fonts.

It is then possible to track a device on various sites through the same fingerprinting method.

Very recently, web developer ‘z0ccc’ shared a new fingerprinting site called ‘Extension Fingerprints’ that is able to generate a tracking hash using a browser’s installed Google Chrome extensions.

In building a Chrome browser extension, creators may be able to declare certain assets as ‘web accessible resources’ that web pages or other extensions may be able to access.

It is also possible to utilize web-accessible resources to detect installed extensions and come up with a fingerprint of a visitor’s browser based on the merger of found extensions.

To evade detection, some extensions, according to z0ccc, use a secret token that is required to access a web resource. But the researcher uncovered a ‘Resource timing comparison’ method that may still be used to monitor if the extension is installed.

“Resources of protected extensions will take longer to fetch than resources of extensions that are not installed. By comparing the timing differences you can accurately determine if the protected extensions are installed,” said z0ccc on the project’s GitHub page.

The extensions that the website is able to identify are uBlock, LastPass, Adobe Acrobat, Honey, Grammarly, Rakuten, and ColorZilla.

The Extensions Fingerprints site only functions via Chromium browsers installing extensions from the Chrome Web Store. While this method will likewise work with Microsoft Edge, it still has to be modified to use extension IDs from Microsoft’s extension store.

Finally, this method does not work with Mozilla Firefox add-ons as Firefox extension IDs are unique in each browser instance.

While z0ccc does not have data regarding installed extensions, his own tests illustrate that uBlock is the most ubiquitous extension fingerprint.

For more information, read the original story in Bleepingcomputer.

Featured Tech Jobs

SUBSCRIBE NOW

Related articles

Polar: A new way of funding open source projects

A company called Polar is introducing a new idea in open-source funding, aiming to allow open source developers...

Hashtag Trending Jan.19-Impact of AI on employment headlines at Davos; New study shows how much data is shared with Facebook; Starlink announces pricey Gigabit...

Where does Open Source fit into the global AI picture? Davos is abuzz with concerns about AI. A new study shows just how much data is shared with Facebook, Starlink announces Gigabit internet but it comes with a steep price, and your smart headphones might be raising eyebrows – literally.   All this and more

Open-source code fuels rise in supply chain cyberattacks

Recent research highlights a concerning trend in cybersecurity: the increasing use of open-source code and legitimate hacking tools...

Google to delete inactive accounts starting December 1

Google is set to delete inactive accounts starting December 1, 2023, in an effort to enhance security and...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways