privacybadger
privacybadger copied to clipboard
Will the proposed Manifest V3 changes to Chrome break Privacy Badger?
https://www.theregister.co.uk/2019/01/22/google_chrome_browser_ad_content_block_change/
It's not entirely clear yet, but at this point it seems that the changes proposed in the Manifest V3 document are made to support basic list-based blockers only. It's not clear how Manifest V3 would allow for more complex extensions like uBlock Origin, uMatrix, or Privacy Badger. I would like to learn more about this situation from Chromium developers.
Our goal is not to break extensions. We are working with extension developers to strive to keep this breakage to a minimum, while still advancing the platform to enhance security, privacy, and performance for all users. ... The most helpful feedback for us is the exact cases that this would impact, their importance, and the reasons they are impossible through either the declarative API or through other extension APIs.
An overview of the Manifest V3 proposal's impact upon Privacy Badger
Privacy Badger is a browser extension that automatically learns to block invisible trackers.
Instead of keeping lists of what to block, Privacy Badger learns by watching which domains appear to be tracking you as you browse the Web. Privacy Badger sends the Do Not Track signal with your browsing. If trackers ignore your wishes, your Badger will learn to block them. Privacy Badger starts blocking once it sees the same tracker on three different websites.
The Manifest V3 proposal thoroughly breaks this description. It appears that Privacy Badger will no longer be able to dynamically learn to block trackers, report what it blocked on a page, block cookies from being set or sent, strip referrer headers, nor properly support EFF's Do Not Track policy.
If you remove what makes Privacy Badger unique, replacing it with basic list-based blocking, what are you left with?
Replacing persistent background pages with ServiceWorkers
A non-persistent event-driven background page does not work well for extensions that need to keep ephemeral state.
-
Privacy Badger maintains per-tab data that includes things like which third-party domains were detected and/or blocked on the page.
-
It may be possible to continuously save and restore state from storage as a workaround, but this runs counter to the stated performance goals of moving away from persistent background pages. It seems that persistent background pages are a much better fit for certain (stateful) types of extensions.
-
As Privacy Badger requires the webRequest API (more on this below), a persistent background page is required as per Chrome extension docs:
The webRequest API is incompatible with non-persistent background pages.
There are likely other issues (will a ServiceWorker background page support functioning in Incognito contexts, which is essential for privacy and security extensions?), but they are eclipsed by the fundamental mistake of trying to shoehorn stateful extensions into an exclusively event driven model.
Restricting origin access / Manifest Host Permission Specification
Making users confirm extension access (host_permissions
) does not seem to make sense for general-purpose content blocking (adblocker/privacy/security) extensions. Outside of edge cases (for example, a Facebook.com-specific extension), content blockers need access across all URLs. Redundantly prompting users for permission to run these scripts (on top of the existing notification users see when initially installing Privacy Badger) will be unhelpful and confusing.
As Chrome extension docs for permissions state:
Use required permissions when they are needed for your extension’s basic functionality.
Dynamic Content Scripts
Many of Privacy Badger's content scripts need to run on all pages in order to do things like detect localStorage-based tracking and canvas fingerprinting, or deny JavaScript access to cookies and localStorage to "yellowlisted" third-party domains.
It would be great to finally have dynamic, before-anything-else injection of content scripts (https://crbug.com/478183). However, as per the host_permissions
note above, it doesn't make sense to make users have to re-confirm this access via permission dialogs.
WebRequest
Removing "blocking" (synchronous request/response interception) from webRequest
will break core Privacy Badger functionality.
The declarativeNetRequest
API is an entirely inadequate replacement as it supports onBeforeRequest
blocking and redirection only (not header/body inspection or modification), and seems to support (a limited number of) hardcoded rules only.
- Privacy Badger needs to dynamically create rules.
- Privacy Badger's rules interact with each other. A request that would be blocked may be overriden to "cookie-blocked" instead by the user, or it may be registered as a DNT-compliant domain and thus allowed.
- Rules need to be further qualified by things like whether the request/response domain is third-party to the top-level document.
- Privacy Badger needs to report what it did (blocked, etc.) on a page.
- Privacy Badger needs to be able to modify content headers (block cookies, strip referrers, perhaps modify ETag headers, ...).
- Privacy Badger would benefit from being able to modify response bodies like WebExtensions can in Firefox. The
webRequest
API should be gaining, not losing functionality. - Privacy Badger needs to encourage privacy-respecting ads by continuing to enforce the EFF Do Not Track policy. This means Privacy Badger needs to continue being able to check blocked domains for declarations of DNT compliance.
The above is not meant to be an exhaustive list. The point is that it is a fundamental mistake to try to shoehorn all content intercepting extensions into the limited-by-design declarative model.
It looks like Google might be backtracking on this:
https://www.zdnet.com/article/google-backtracks-on-chrome-modifications-that-would-have-crippled-ad-blockers/
https://groups.google.com/a/chromium.org/forum/#!topic/chromium-extensions/WcZ42Iqon_M
Related: Eloston/ungoogled-chromium#706.
⚠️ UPDATE: Blocking capabilities of webRequest are still being deprecated, see https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-495936668 (original post deleted) and commentary by @gorhill: https://github.com/uBlockOrigin/uBlock-issues/issues/338#issuecomment-496009417.
Thanks @Giltyhub for update!
See the issue in HTTPS Everywhere's repository for statements recently made by browser vendors: https://github.com/EFForg/https-everywhere/issues/17268.
@ghostwords I'm finding little current info on MV3 generally and wondering if you've learned anything new about it's impact on Privacy Badger? Is any work being done to develop a POC/ MV3-compliant version of the extension?
You can read our latest update on the EFF blog, Google’s Manifest V3 Still Hurts Privacy, Security, and Innovation. While the post doesn't go into Privacy Badger specifically, we talk about what happened around Manifest V3 in the last two years, what's (still) wrong with it, and how it could be better.
I have been participating in the W3C WebExtensions Community Group to advocate for extension developers and to raise awareness of the many problems with Manifest V3.
Privacy Badger in Manifest V3 is blocked by at least one (long-outstanding) bug, Chromium Issue 102421: webRequest listeners not called after service worker stops.
@ghostwords I'm already familiar with the EFF post, Thanks for the specific example of an issue facing many developers.
@ghostwords Is there any development status of a MV3-compliant version of Privacy Badger other than your previous reply above?
Nope, https://github.com/EFForg/privacybadger/issues/2273#issuecomment-1009197551 is still the latest status.
I permanently switched to Firefox when this happened (and hopefully we all realise Mozilla is subject to the same whims of private ownership & the global market as Google is).
I think this event serves as a very salient reminder that you can never truly address solve social problems with technical solutions alone. I have tremendous respect for all devs who give their time helping users sidestep or work around oppressive & exploitative technology, but we should all understand that, fundamentally, this kind of dynamic will persist forever until all users and software authors democratically share the means of making and changing software - which includes all currently private intellectual property - and that the only way to permanently achieve that is through extralegal, democratically worker-led global revolution.
Since the rollout of 2023 is fast approaching, is an MV3 compatible version of Privacy Badger in development?
Yes, I'm working on it. I'll post an update when we have something to share.
Thanks!
@ghostwords MV2 deprecation slated for June '24. How is MV3 development going? https://developer.chrome.com/blog/resuming-the-transition-to-mv3/
It's going! We've been making changes to prepare Privacy Badger for non-persistent background processes, be it an event page (Firefox) or an extension service worker (Chrome). We're now moving content filtering from webRequest
to declarativeNetRequest
.
@ghostwords Thanks for the update!
@ghostwords, let me know if there's anything I can help with on the Firefox side of things.