Using "blind tokens" to further anonymize users and their authenticated activity.
Some prior art and references:
[1] https://blog.cloudflare.com/privacy-pass-the-math/
[2] https://privacypass.github.io/protocol/
[3]
[4] https://en.wikipedia.org/wiki/Blind_signature
[5] https://www.rfc-editor.org/rfc/rfc9474.html
From the Cloudflare blog post:
In summary, this browser extension allows a user to generate cryptographically ‘blinded’ tokens that can then be signed by supporting servers following some receipt of authenticity (e.g. a CAPTCHA solution). The browser extension can then use these tokens to ‘prove’ honesty in future communications with the server, without having to solve more authenticity challenges.
The ‘blind’ aspect of the protocol means that it is infeasible for a server to link tokens token that it signs to tokens that are redeemed in the future. This means that a client using the browser extension should not compromise their own privacy with respect to the server they are communicating with.
From Cathie Yun's blog post:
Blind signing is exactly what it sounds like: a protocol where someone signs something without knowing (being blind to) what they are signing. This concept was first described by Chaum in 1982 in his paper, Blind Signatures for Untraceable Payments. Basically, blind signing allows you to decouple the signing step (since the signer is blind) from the redemption step, giving nice privacy guarantees. The concept might seem a bit contrived, but is actually useful in a few situations, including digital cash schemes and voting protocols. For a really good explanation of how this works using the voting analogy, see the Cloudflare blog post on Privacy Pass; if you like talks more, I explained the concept in my talk at 0x0G.
This feature improves the security on the backend and should be (nearly) transparent to the user.
The only thing the user would change slightly is passing an authenticated session token for addon extensions in private-browsing searching.