Was browsing on the GrapheneOS website and came across a new thing called WebUSB, which is essentially a JS API through which GrapheneOS web installer worked.

This got me wondering, if website could read what’s plugged into my computer like my phone or disks, isn’t that a huge risk to privacy? I don’t know how this works (haven’t used it) so I would like to know about its privacy.

AFAIK Firefox doesn’t allow this API, so that’s a relief (I use librefox), but what about other browsers? I am getting a bit paranoid.

[Also, are there other APIs like these; which are a privacy nightmare that websites could use?]

  • refalo@programming.dev
    link
    fedilink
    arrow-up
    14
    arrow-down
    2
    ·
    edit-2
    3 months ago

    Yes there is a risk of bugs being exploited just like any other feature in a browser. Another example is WebRTC being used to de-cloak VPN users. I think WebGPU and/or WebGL also had exploits that allowed remote code execution or escaping the browser sandbox.

    • Chemical Wonka
      link
      fedilink
      English
      arrow-up
      5
      ·
      3 months ago

      WebRTC being used to de-cloak VPN users

      The clock of my device always match with the location of the server of my VPN provider

        • Chemical Wonka
          link
          fedilink
          English
          arrow-up
          2
          ·
          3 months ago

          I manually set the ntp server of my device to match with the location of my VPN server and use an pp to see the time of my real location.

            • Chemical Wonka
              link
              fedilink
              English
              arrow-up
              3
              ·
              3 months ago

              You don’t need to change your ntp server exactly you can just set the time zone settings of your device (android)to match the same region of your VPN server. if you want to go a step further you have the option (not mandatorily) to change the NTP server of your device.