Abstract | ||
---|---|---|
As web browsers have become more sophisticated at blocking unauthorized attempts to track users' online activities incognito mode, Do Not Track, so too have trackers evolved to trump those protections. In many cases, these new forms of tracking have turned features designed to improve the web experience against user privacy. We focus on browser fingerprinting as a testbed for proposing a novel approach to fighting back for user privacy. By intercepting and obfuscating the information generated by browser fingerprinting scripts, the user not only frustrates the attempt to track their movements, but, more importantly, wider usage degrades the quality of trackers' databases, reducing the effective entropy of their metrics, thereby yielding privacy gains for all users, not just those employing this method of obfuscation. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-26096-9_19 | Security Protocols Workshop |
Field | DocType | Volume |
BitTorrent tracker,World Wide Web,Internet privacy,Web browser,Computer science,Computer security,Testbed,Web tracking,Do Not Track,Obfuscation,User privacy,Scripting language | Conference | 9379 |
ISSN | Citations | PageRank |
0302-9743 | 0 | 0.34 |
References | Authors | |
3 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sandy Clark | 1 | 70 | 8.29 |
matt blaze | 2 | 3189 | 381.70 |
Jonathan Smith | 3 | 119 | 19.60 |