Skip to content

Commit e879d65

Browse files
committed
Remove the limiting of rate as it is replace by obfuscation
1 parent c318976 commit e879d65

File tree

1 file changed

+6
-36
lines changed

1 file changed

+6
-36
lines changed

index.html

Lines changed: 6 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -265,8 +265,8 @@

Sampling and Reporting Rate

265265
supported or accepted by the underlying platform and [=user agent=]<sup>sup>.
266266
p>
267267
<p>
268-
<sup>sup>It is recommended that the [=user agent=] limits the [=reporting rate=]
269-
as outlined in [[[#rate-limiting-change-notifications]]].
268+
<sup>sup>The specification additionally obfuscates the rate as outlined
269+
in [[[#rate-obfuscation]]].
270270
p>
271271
<p>
272272
In case the user didn't request a [=sampling rate=], the [=sampling rate=]
@@ -1751,7 +1751,7 @@

Timing attacks

17511751
or very precise values can be accessed at the same time by sites not sharing
17521752
origin.
17531753

1754-
This attack is mitigated by [[[#data-minimization]]], [[[#rate-limiting-change-notifications]]],
1754+
This attack is mitigated by [[[#data-minimization]]], [[[#rate-obfuscation]]],
17551755
and [[[#same-origin-restriction]]].
17561756
p>
17571757
<h4>Cross-site covert channelh4>
@@ -1766,8 +1766,8 @@

Cross-site covert channel

17661766
This process is repeated as long as the scripts run on both the sites A and B.
17671767
p>
17681768
<p>
1769-
This attack is mitigated by [[[#rate-limiting-change-notifications]]], [[[#rate-obfuscation]]] and
1770-
[[[#break-calibration]]]. Implementers are advised to consider all these mitigations for long-running scripts.
1769+
This attack is mitigated by [[[#rate-obfuscation]]] and [[[#break-calibration]]].
1770+
Implementers are advised to consider all these mitigations for long-running scripts.
17711771
p>
17721772
<div class="note">
17731773
The longer the scripts run the more information can be transmitted using the proposed cross-site covert channel.
@@ -1841,37 +1841,7 @@

Data minimization

18411841
p>
18421842
<p>
18431843
The specific application of data minimization principles in the context of this specification
1844-
are discussed in [[[#rate-limiting-change-notifications]]] and [[[#same-origin-restriction]]].
1845-
<section>
1846-
<h4>Rate-limiting change notificationsh4>
1847-
<p>
1848-
By rate-limiting the delivery of the pressure state information we remove the
1849-
attacker's ability to observe the precise time when a value transitions between two states.
1850-
p>
1851-
<p>
1852-
More precisely, once the pressure observer is activated, it will be
1853-
called once with initial values, and then is called when the values change.
1854-
The subsequent calls will be rate-limited. When the callback is
1855-
called, the most recent value is reported.
1856-
p>
1857-
<p>
1858-
The specification will recommend a rate limit of at most one call per second
1859-
for the active window, and one call per 10 seconds for all other windows. We
1860-
will also recommend that the call timings are jittered across origins.
1861-
p>
1862-
<p>
1863-
These measures benefit the user's privacy, by reducing the risk of
1864-
identifying a device across multiple origins. The rate-limiting also benefits
1865-
the user's security, by making it difficult to use this API for timing attacks.
1866-
Last, rate-limiting change callbacks places an upper bound on the performance
1867-
overhead of this API.
1868-
p>
1869-
<p>
1870-
Rate limiting can be implemented in the user agent, but it might also be
1871-
possible to simply change the polling/sampling rate of the underlying hardware
1872-
counters, if not accessed via a higher level framework.
1873-
p>
1874-
section>
1844+
are discussed in [[[#rate-obfuscation]]] and [[[#same-origin-restriction]]].
18751845
<section>
18761846
<h4>Rate obfuscationh4>
18771847
<p>

0 commit comments

Comments
 (0)