IDG News Service - Even without cookies, popular browsers such as Internet Explorer and Firefox give Web sites enough information to get a unique picture of their visitors about 94 percent of the time, according to research compiled over the past few months by the Electronic Frontier Foundation.
The research puts a quantitative assessment on something that security gurus have known about for years, said Peter Eckersley, the EFF senior staff technologist who did the research. He found that configuration information -- data on the type of browser, operating system, plugins, and even fonts installed can be compiled by Web sites to create a unique portrait of most visitors.
This means that most Internet users are a lot less anonymous than they believe, Eckersley said. "Even if you turn off cookies and you use a proxy to hide your IP address, you could still be tracked," he said.
The data doesn't actually identify the Web user, but it creates a unique browser "fingerprint," that can be used to identify the user when he visits other Web sites.
And using the private mode offered by some browser-makers does nothing to stop this analysis. "They provide you with some protection against other people who may be in your house or who have access to your computer, but they haven't got to the point where they've provided protection against the companies that are profiling Web users," Eckersley said.
In fact, there are already a handful of companies have already started offering this kind of cookie-less Web tracking to help e-commerce sites identify fraudsters. Companies such as 41st Parameter, ThreatMetrix, and Iovation are widely used in the banking, e-commerce and social Web sites.
And the products work. Last August, when Serbian criminals started testing stolen credit cards by posting hundreds of US$1.99 transactions to the iReel.com online movie site each day, iReel turned to ThreatMetrix to get a fix on the fraudsters.
Using similar techniques to those described by the EFF, ThreatMetrix generated digital fingerprints of site visitors, which helped iReel know when a single user was trying to use hundreds of different credit cards, even when the fraudster was using proxy IP addresses, said Adam Altman, iReel's chief operations officer. "We were able to cut out a lot of the unnecessary transactions," he said.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
- Social Media Education: The New Edge for Success Failure to train for social media will cost your business money. A recent report showed how digitally prepared companies can unlock up to...
- Social Media in Technology: A Unified Strategy for Success Find out how social media is sparking a new era of customer and industry-understanding in technology enterprises and how industry leaders are overcoming...
- How Network Connections Drive Web Application Performance Users around the globe, on all sorts of devices, expect Web applications to function as seamlessly as desktop applications. This paper discusses the...
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer... All Internet White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!