Google did it again.

  • DarienGS@lemmy.world
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    3
    ·
    1 year ago

    I read this article from top to bottom and didn’t find a clear explanation of why you should disable this feature.

    • conciselyverbose@kbin.social
      link
      fedilink
      arrow-up
      34
      arrow-down
      1
      ·
      1 year ago

      Because it doesn’t protect your privacy (Google still tracks everything), but it gives Google an even stronger monopoly to make taking other actions to protect your privacy less viable.

      The end game is still their web DRM pretending to be “security” to make it impossible for you to choose how a page is displayed to you.

      • DarienGS@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        2
        ·
        1 year ago

        Google doesn’t track everything. The browser determines your interests locally; the only information shared with Google (and advertisers) is which broad topics you’ve recently shown an interest in.

    • underisk@lemmy.ml
      link
      fedilink
      English
      arrow-up
      15
      ·
      edit-2
      1 year ago

      It’s an underhanded way of implementing a browser supported foolproof adblock detector. Even its stated goal of “give advertisers a unified, browser backed, ‘private’ way of tracking you for advertising” isn’t especially appealing or useful when you get something better than that from adblock anyway. Turning it off will be reflected in telemetry sites gather about feature availability and hopefully low adoption numbers discourage them from taking advantage of this “feature”.

      • orclev@lemmy.world
        link
        fedilink
        English
        arrow-up
        4
        ·
        1 year ago

        Hmm, not having read up on the tech, what’s stopping someone from making a Firefox plugin that just spoofs fake data back? It’s all done client side if I’m understanding, so everything necessary to do so must be available. Only wrinkle I could see is if they have signing and ship the cert with Chrome and regularly rotate it. It’s still not impossible in that case, just more annoying.

        • underisk@lemmy.ml
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 year ago

          My understanding is vague but the sandbox environment is cryptographically integrity checked in some fashion that makes the spoofing you’re suggesting difficult or impossible.

          • orclev@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            edit-2
            1 year ago

            Well, I did a little digging, and while parts of the stuff proposed by Google might be tricky, the actual topics portion of the API looks pretty easy to spoof. It seems like there’s really only two things that need to be done. The first is to spoof the feature detection logic to return true for calls to document.featurePolicy.allowsFeature('browsing-topics'). The second would be to return randomly selected topics from all available topics from calls to document.browsingTopics() (care might need to be taken to return a consistent set of random topics to a given page, otherwise clever sites might poll the API many times to detect randomness). That really seems to be all there is to the topics API part of this. As for spoofing the rest of the web DRM parts, that’s going to be a lot trickier, but with control of the browser I can’t see how it could be made insurmountable.