Google reveals security flaws in Apple’s Safari anti-tracking feature

Flaws in the Intelligent Tracking Prevention allowed Safari users to be tracked

Google researchers have discovered significant security flaws in a privacy feature in Apple’s Safari browser, which allowed for user browsing behaviour to be tracked.  

In an as-yet-unpublished report seen by the Financial Times, Google researchers found that multiple flaws in Apple’s Intelligent Tracking Prevention (ITP) feature in Safari, which, somewhat ironically, enabled third parties to gain access “sensitive private information about the user’s browsing habits”.

Related Resource

Don't overlook your email archiving systems

Business users benefit from tools that balance productivity and compliance needs

Download now

Despite being designed to prevent users from being tracked around the web by advertisers and third-party cookies, according to Google’s report, the flaws in ITP placed Safari users’ personal data at risk, making it possible for confidential information, such as browsing behaviour, to be obtained by those who shouldn’t have access to it. 

The report also claims that Google representatives informed Apple about the security flaw in August 2019.

Apple acknowledged the report in a blog post written by privacy and security engineer John Wilander in December. 

“We’d like to thank Google for sending us a report in which they explore both the ability to detect when web content is treated differently by tracking prevention and the bad things that are possible with such detection,” said Wilander. “Their responsible disclosure practice allowed us to design and test the changes detailed above.” 

Apple has reportedly fixed the security issues with ITP last year.

The news comes only months after Google researchers exposed a wide-ranging Apple and Android phone-hacking scheme which targeted the persecuted Uighur minority in China.

Google and Apple had previously clashed over Safari when a High Court blocked a mass lawsuit over iPhone data.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Most Popular

The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
Security

Mobile browser flaw exposes users to spoofing attacks

21 Oct 2020