Date: 21 December 2011
Click here for printable version
Depending on the number of CSS files used in the test, a list of previously visited sites can be assembled quickly by this JavaSript code.  This attack is based on cache timings and was first described in a paper by E. Felten et al, circa 2000.
An example of these CSS files used for identifying MySpace users is 'http://x.myspacecdn.com/modules/common/static/css/futuraglobal_kqj36l0b.css', which is a standard CSS file used in most MySpace.com pages. 
This script (or variations of) has been found to be affective in Firefox, Chrome, Safari and Opera. A version targeted at Internet Explorer users is currently being developed.  At the time of posting there have been no patches issued by browser vendors to correct this vulnerability.
Happy and Safe browsing,
 Implementation of attack for Firefox.
 Original Paper by E. Felten et al.
 Rapid history extraction through non-destructive cache timing (v8)