Researchers say a new side-channel attack can be reliably exploited to leak information from web browsers that could then be leveraged to track users even when JavaScript is completely disabled. The findings, which come from a group of academics from the Ben-Gurion Univ. of the Negev, the University of Michigan, and University of Adelaide, will be presented at the USENIX Security Symposium in August. The attacks are architecturally agnostic, resulting in microarchitectural website fingerprinting attacks that work across hardware platforms.
Source: https://thehackernews.com/2021/03/new-browser-attack-allows-tracking.html

