Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Yes... Yes they do need to see the website you're visiting for the malicious website warning to appear. That's..... precisely how SmartScreen works. It takes the URL and asks is xyz dot com on the list? Yes? Load the warning instead.

That's also precisely how Brave Shields works, a company that sells your data by the way and hasn't stripped out all of Google's trackers... which is how they fund Brave Rewards. They send your website data in to compare it against their database before loading the page.

That's also precisely how Firefox Phishing and Malware Protection works... by checking the website against many available lists of malicious websites.

It's also how Safari Safe Browsing works. The data is compared against an online database for malicious websites. Actually, against Google's Safe Browsing Service.

Notice any trends here?
This is not, in fact, how Safe Browsing APIs work. Instead, you download a database ahead of time, with more detailed information as needed. At no point do you share the actual URL requested.
 
Ah, one more step toward what OmniWeb’s feature set included decades ago. Someday, the modern browsers will have finally filled in all the missing pieces....
 
They don’t need to see your data. It’s got nothing to do with malicious websites. It’s to do with wanting your data. Safari warns me of potentially dangerous sites, as does Firefox, as does Brave. Non of them have access to my browsing history. There is no need for Google chrome or Microsoft edge or any of the others to see my browsing history other than to glean information from it. Non at all.

They can’t see it. That’s the point. If that data is linked to you then it doesn’t even matter does it. If the data is a garbled encrypted mess then it’s not data.
But the fact with Safari and Firefox et al is that even this encrypted mess of data is not associated with you. It’s specifically disassociated with any unique identifiers on safari, and on top of that, with Firefox you can easily set up a sync account anonymously using made up details. You can even host your own sync server!
Microsoft really has no business or need to be seeing what one browses.
If it's doesn't link to you, how do they sync that exactly data to you. And second we all don't know what running inside they servers.
 
This is not, in fact, how Safe Browsing APIs work. Instead, you download a database ahead of time, with more detailed information as needed. At no point do you share the actual URL requested.

It is, in fact, how it is used. The list is continuously updated, and not downloaded when the API call is made. You’d be downloading a new database every few seconds, rather than sending out a URL to check for a match once.
 
It is, in fact, how it is used. The list is continuously updated, and not downloaded when the API call is made. You’d be downloading a new database every few seconds, rather than sending out a URL to check for a match once.
You don’t check the API for a match.
 
You don’t check the API for a match.
.... the URL goes to Microsoft and they check it with THEIR API call to the many databases.

In Windows you can also do this with files and .exe’s that are stored locally - really anything that shows in File Explorer. It sends data to Microsoft, they do the check and return a result to you.

Your agent to do this is Microsoft... share with one, they call to many. Rather than you calling to many.
 
.... the URL goes to Microsoft and they check it with THEIR API call to the many databases.
I’m discussing the Google Safe Browsing API, since you incorrectly stated: “It's also how Safari Safe Browsing works.”

I don’t know what MS does. If they do transmit individual URLs, that’s a poor design. Safari does not transmit individual URLs to check if they are safe. At no point does Apple or Google know whether you wanted to know if a URL is safe.
In Windows you can also do this with files and .exe’s that are stored locally - really anything that shows in File Explorer. It sends data to Microsoft, they do the check and return a result to you.
That’s a different thing though. (But yes, problematic, just like notarization.)
 
If it's doesn't link to you, how do they sync that exactly data to you. And second we all don't know what running inside they servers.
True, unless its verifiable and open source, you cannot be sure whether they say what they’re doing is acually what they’re doing.
However, obviously it's linked to you, but the link is diassociated from your ID and therefore you, and the data is encrypted. So they dont know it’s you, and they dont know what your browsing.
Yes... Yes they do need to see the website you're visiting for the malicious website warning to appear. That's..... precisely how SmartScreen works. It takes the URL and asks is xyz dot com on the list? Yes? Load the warning instead.

That's also precisely how Brave Shields works, a company that sells your data by the way and hasn't stripped out all of Google's trackers... which is how they fund Brave Rewards. They send your website data in to compare it against their database before loading the page.

That's also precisely how Firefox Phishing and Malware Protection works... by checking the website against many available lists of malicious websites.

It's also how Safari Safe Browsing works. The data is compared against an online database for malicious websites. Actually, against Google's Safe Browsing Service.

Notice any trends here?

In case you’ve all forgotten what you’re aurguing about; The privacy label in the Edge AppStore entry said that the browsing history is data that may be collected and linked to your identity. That means Microsoft have access to what you’re looking at on the internet.

Neither Firefox nor Safari operate like this. Your data is not available to either Apple or Mozilla for perusal or scrutiny. That doesnt appear to be the case with Microsoft Edge.
 
Last edited:
In case you’ve all forgotten what you’re aurguing about; The privacy label in the Edge AppStore entry said that the browsing history is data that may be collected and linked to your identity. That means Microsoft have access to what you’re looking at on the internet.

Neither Firefox nor Safari operate like this. Your data is not available to either Apple or Mozilla for perusal or scrutiny. That doesnt appear to be the case with Microsoft Edge.

They ALL operate like that. Sorry about your luck. I fully explained what's going on with that data, and how it's being used.
 
I’m discussing the Google Safe Browsing API, since you incorrectly stated: “It's also how Safari Safe Browsing works.”

I don’t know what MS does. If they do transmit individual URLs, that’s a poor design. Safari does not transmit individual URLs to check if they are safe. At no point does Apple or Google know whether you wanted to know if a URL is safe.

That’s a different thing though. (But yes, problematic, just like notarization.)

Ok... but that's exactly how it's used. With the Google Safe Browsing API, you're sending the URL and other data in to be validated if it has certain marks of suspicious webpages and is not present in the database.

...and it isn't Hashed like other databases, so Google knows exactly what you're looking at.


"Chrome will send an incident report to Google every time you receive a warning, visit a suspicious page, and on a very small fraction of sites where Chrome thinks there could be threats, to help Safe Browsing learn about the new threats you may be encountering. Additionally, some downloaded files that are suspicious and show a warning may be sent to Google for investigation each time they are encountered. All reports are sent to Google over an encrypted channel and can include URLs, headers, and snippets of content from the page and they never include data from browsing you do in Incognito mode. If Chrome discovers unwanted or malicious software on your machine, the reports may also include details about malicious files and registry entries. This data is used only to improve Safe Browsing and to improve security on the Internet."
 
Ok... but that's exactly how it's used. With the Google Safe Browsing API, you're sending the URL and other data in to be validated if it has certain marks of suspicious webpages and is not present in the database.

...and it isn't Hashed like other databases, so Google knows exactly what you're looking at.


"Chrome will send an incident report to Google every time you receive a warning, visit a suspicious page, and on a very small fraction of sites where Chrome thinks there could be threats, to help Safe Browsing learn about the new threats you may be encountering. Additionally, some downloaded files that are suspicious and show a warning may be sent to Google for investigation each time they are encountered. All reports are sent to Google over an encrypted channel and can include URLs, headers, and snippets of content from the page and they never include data from browsing you do in Incognito mode. If Chrome discovers unwanted or malicious software on your machine, the reports may also include details about malicious files and registry entries. This data is used only to improve Safe Browsing and to improve security on the Internet."
I have a problem with the Instagram and Whatsapp system.
On Instagram publishing stories it generates a fuse of wilted time.instead of whatsapp does not open voice memos, it is a problem of software no whatsapp is because I distillated it several times.
 
They ALL operate like that. Sorry about your luck. I fully explained what's going on with that data, and how it's being used.

Ok... but that's exactly how it's used. With the Google Safe Browsing API, you're sending the URL and other data in to be validated if it has certain marks of suspicious webpages and is not present in the database.

...and it isn't Hashed like other databases, so Google knows exactly what you're looking at.


"Chrome will send an incident report to Google every time you receive a warning, visit a suspicious page, and on a very small fraction of sites where Chrome thinks there could be threats, to help Safe Browsing learn about the new threats you may be encountering. Additionally, some downloaded files that are suspicious and show a warning may be sent to Google for investigation each time they are encountered. All reports are sent to Google over an encrypted channel and can include URLs, headers, and snippets of content from the page and they never include data from browsing you do in Incognito mode. If Chrome discovers unwanted or malicious software on your machine, the reports may also include details about malicious files and registry entries. This data is used only to improve Safe Browsing and to improve security on the Internet."
It’s ok to have an opinion. But don’t spread fud like it’s a fact. Also it’s quite irrelevant and/or detrimental to your argument by quoting Google chrome privacy practices regarding this thread, being as though we’re talking about Edge Firefox and Safari.
 
Last edited:
Ok... but that's exactly how it's used. With the Google Safe Browsing API, you're sending the URL and other data in to be validated if it has certain marks of suspicious webpages and is not present in the database.

...and it isn't Hashed like other databases, so Google knows exactly what you're looking at.
Yes, it’s literally hashed. Not only that, a hash isn’t transmitted, but rather the prefix of a hash.
 
Yes, it’s literally hashed. Not only that, a hash isn’t transmitted, but rather the prefix of a hash.

Sigh... the database list is hashed, and if there's a match against the hash, the full URL is sent to Google... unmasked.

It's literally in the Overview of the Google Developer API page for it.
 
I’m discussing the Google Safe Browsing API

It’s ok to have an opinion. But don’t spread fud like it’s a fact. Also it’s quite irrelevant and/or detrimental to your argument by quoting Google chrome privacy practices regarding this thread, being as though we’re talking about Edge Firefox and Safari.

We seem to be contradicting ourselves now. Are we talking about the API? Or are we not? You said what you, yourself, were discussing. I replied to that. In any event...


Lookup API (V4)

Privacy: URLs are not hashed, so the server knows which URLs you look up.
 
Sigh... the database list is hashed,
The main database contains hash prefixes. If you match a prefix, and you don’t have recent data for that prefix, you fetch all data matching that prefix from Google.
and if there's a match against the hash, the full URL is sent to Google... unmasked.
It isn’t. If it were, none of the hashing would make any sense.
 
We seem to be contradicting ourselves now. Are we talking about the API? Or are we not? You said what you, yourself, were discussing. I replied to that. In any event...
I pointed out to you how Microsoft edge, in contradiction to other browsers such as safari Firefox and brave, can see your browsing history and it remains linked to you. Then you made this ludicrous and completely irrelevant comment:
@cupcakes2000

A browser that keeps browsing history?

Shocking! I never knew. How could they have done this to us!!!

Oh no! I found this in Safari too!

View attachment 1740046

...and now you’re claiming safari and Firefox send URL’s to Google in plain text, and quoting chrome browsers privacy policy as ‘proof’. *shrug*
 
@cupcakes2000: Any app allow sync data will have that. Include safari, but since safari not on appstore, you won't see that label.

Grrr tried to add both @cupcakes2000 screenshot of tracking along with your quote above.

I'm hoping Apple in iOS/iPadOS implements further data reporting of apps.

Stating that browsing history alone is not enough, as highlighted by @arhytcipt ... it's confusing at best, misleading at worse. We need specifically WHAT an app is actually doing.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.