How advertising cookies let observers follow you across the web
2014-04-09 21:13
274 查看
How advertising cookies let observers follow you across the web
By RussellBrandom 原文位于 来源
Back in December, documents revealed the NSA had been using
Google's ad-tracking cookies to follow browsers across the web, effectively coopting ad networks into surveillance networks. A
new paper from computer scientists at Princeton breaks down exactly how easy it is, even without the resources and access of the NSA. The researchers were able to reconstuct as much as 90% of a user's web activity just from monitoring traffic to ad-trackers
like Google's DoubleClick. Crucially, the researchers didn't need any special access to the ad data. They just sat back and watched public traffic across the network.
As it turns out, trackers are displaying a surprising amount of information in public. Each ad system gives a user a unique ID number, but by following the same browser session from system to system, the researchers were able
to tie together the vast majority of a given user's web requests. By following those same cookies to identity-based services like Facebook and Google+, the researchers were able to give a name to each user.
The result is, for a given pageview, it's surprisingly easy to trace back to a person's name and the other pages they've visited. Security measures like HTTPS threw researchers off the case a little bit, but the density of ad
cookies makes them easy to get around. The only solid protection was the routing network Tor, which scrambled IP addresses thoroughly enough to escape the researchers' impromptu dragnet.
相关文章推荐
- mysql应用减号的问题
- leveldb 合并写详解
- HDOJ-1114 Piggy-Bank 完全背包
- 解析OpenSSL漏洞:影响巨大 两年前已存在
- 数据库牛人牛新庄的成长历程
- vector中的size和capacity
- 翻转字符串(剑指offer42)
- jquery常用选择器
- HTTP协议详解
- win32 MFC 线程
- ubuntu12.04 安装2013QQ
- void *
- HornetQ之JMS2.0 (实例讲解)
- 单例模式的实现技巧
- 华为C语言编程规范(3)—注释
- Android系统启动过程详解
- URAL 1450 无环图最短路
- jQuery Validate
- POJ 1269 Intersecting Lines(直线位置关系,水)
- jsp自定义标签 <dict:select... 选择标签和数据字典