this post was submitted on 14 Jul 2024
46 points (61.1% liked)

Firefox

20372 readers
175 users here now

/c/firefox

A place to discuss the news and latest developments on the open-source browser Firefox.


Rules

1. Adhere to the instance rules

2. Be kind to one another

3. Communicate in a civil manner


Reporting

If you would like to bring an issue to the moderators attention, please use the "Create Report" feature on the offending comment or post and it will be reviewed as time allows.


founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[โ€“] Melody@lemmy.one 2 points 1 year ago* (last edited 1 year ago) (1 children)

I can already see how Advertisers AND Websites will collude and break this one.

  • Specifically placed ads; targeted at specific website pages which a majority of their target grouping will visit.
  • Generate an ad that will specifically reside on a page deep inside of the site; think 4+ clicks deep; which is intensely personalized to their target. ^1^
  • Ad will trigger; register "Impression" and be boxed up into Differential Privacy set by the DAP.
  • Since that's the only ad targeted for that specific page, any impression is an answer of 1 or 'True'.
  • Through microtargeting of these deep pages they can learn a lot about what people do online and could potentially break Differential Privacy.

1 - In this example the URI being targeted could be something like https://www.example.com/zhuli/do/the/* in such a way that when you visit https://example.com/zhuli/do/the/thing/order.php is always recorded.

[โ€“] Melody@lemmy.one 3 points 1 year ago

https://datatracker.ietf.org/doc/html/draft-ietf-ppm-dap#name-security-considerations

In theory this could be defeated easily if a fork of Firefox wanted to send lots of noise or someone decided to emulate many Firefox clients with false information.