Sniffing browser's history is not new. But recently researchers have found new ways to perform it, allowing a high sniffing rate
The faster the attack, the longer the list of target sites an attacker can ‘sniff’ in a reasonable amount of time. The fastest history sniffing attacks have reached rates of thousands of URLs tested per second, allowing attackers to quickly put together detailed profiles of web surfers’ online activity.
All the tested browsers (even Brave) but TBB are vulnerable to these attacks, Chrome being the most vulnerable of all:
https://www.helpnetsecurity.com/2018...-to-attackers/All of the attacks the researchers developed in their WOOT 2018 paper worked on Google Chrome. Two of the attacks also worked on a range of other browsers, from Mozilla Firefox to Microsoft Edge, as well various security-focused research browsers. The only browser which proved immune to all of the attacks is the Tor Browser, which doesn’t keep a record of browsing history in the first place.
On Firefox, it is said in the paper that turning the pref layout.css.visited_links_enabled to false should solve the issue but in fact, doesn't.
Bookmarks