Choices we make while on the internet, as well as our preferences, could be used by advertisers, malevolent individuals, and other third parties to create certain pattern algorithms.

These browsers are vulnerable to scheme flooding

Even though new security measures, features, and updates are applied all the time, Firefox, Chrome, Safari, and Tor are the four browsers that are vulnerable to this sort of exploits. Senior software engineer and researcher Konstantin Darutkin spoke about this phenomenon and warned users worldwide about the potential implication that such actions could have. These operations have been dubbed “scheme flooding” by the group of researchers, because of the fact that the attackers are able to use the browsers’ built-in custom URL scheme against us. By using this technique, our devices are flooded with URL scheme requests used for acknowledging the presence of popular apps like Spotify, Zoom, Slack, Telegram, Discord, Steam, Xcode, Microsoft Word, NordVPN, or Hotspot Shield. The more disconcerting news is that this can happen even if the users switch between browsers or try using a VPN, or incognito mode. According to the researchers, this manner of virtual intrusion can also be successfully used on other browsers, such as Brave, Microsoft Edge, and Yandex. Although this issue didn’t just emerge overnight, it seems that the developers of the browsers above mentioned have not yet grasped the magnitude of the situation. It remains to be seen how quick the tech companies will react and, more important, fix these privacy mishaps. It goes without saying that users will not be pleased to hear this news. In the meantime, remember that until this vulnerability is fixed, the only way to have private browsing sessions not associated with your primary device is to use another device altogether.  Let us know in the comments section below if you had such security concerns until now and how you addressed them.

Name * Email * Commenting as . Not you? Save information for future comments
Comment

Δ