In what way are avatars a privacy risk?
To display an avatar image, you publish an encrypted version (MD5) of the e‑mail address in the gravatar’s image URL. Gravatar.com then decides if there is an avatar image to deliver, otherwise the default image is delivered. The default image’s address is also part of the overall gravatar image URL. Normally, both the avatar image and the default image are requested from Gravatar.com servers. This process has the following problems:
- MD5 is theoretically secure, but research has shown that it is possible to guess the e‑mail address from the MD5 token in the gravatar URL: gravatars: why publishing your email’s hash is not a good idea. So there is a chance that you make your commenter’s e‑mail addresses public.
- The published avatar URL ties all comments made with the same (privately entered) e‑mail address together (publicly). The user might use different pseudonyms and web addresses with the comment, they even might want to stay anonymous. But if the web site admin enables gravatars, even at a later point, all this user’s comments can be recognized as being made by the same person. Creating such a comment profile for an e‑mail address is easiest for Gravatar.com, they just have to look into their log files from where a particular image was requested (request header). That works for everyone, not only Gravatar.com registered users. And of course, anybody else can program a bot to find occurrences of a particular avatar URL throughout the web. The commenter most likely does not know what entering an e‑mail address means, usually is not told and has no control over whether a gravatar is displayed for his address or not.
- Whenever someone visits the page, the avatar images are loaded from the Gravatar.com servers into the visitor’s browser. By doing so, Gravatar.com gets all kind of data, e.g. the visitor’s IP address, the browser version, and the URL of the page containing the avatar images. Since gravatars are used on many websites, if the visitor visits a lot of blogs while using the same IP address, the Gravatar.com log files show exactly where the person using this IP address went.
- If somebody wants to create fake comments using someone else’s identity, this looks all the better with the matching gravatar image next to it. If you know the e‑mail address used for the comment, great. If not just create a new gravatar account and upload the same picture.
How does Avatar Privacy help with these problems?
The plugin offers some measures to deal with these problems. It’s not perfect or a complete solution, but some of the above points can be addressed sufficiently:
- All default images are hosted or generated on your server instead of at Gravatar.com.
- Only for users and commenters who explicitly give their consent will Gravatar.com be contacted to get their avatar image. This shares the MD5 hash of their e‑mail address with Gravatar.com.
- To prevent Gravatar.com from tracking your site’s visitors, these gravatars will be cached locally and the only IP address sent to Gravatar.com will be that of your server.
- Instead of MD5, Avatar Privacy uses a salted SHA256 hash for identifying avatars. This means that the published hashes cannot be used to track people across the web. (It also means that generated avatars will be different between websites.)
- The plugin does nothing against the fake identity problem. It’s questionable if any countermeasures would even be possible without changing the way that Gravatar.com works. Stealing identities is always possible, you can do it with a comment form without gravatars just as well. So that’s not really the focus of this plugin.
No Comments
Mentions