Jump to content

Evercookie: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Tags: Mobile edit Mobile web edit
Citation bot (talk | contribs)
Alter: issue, url. URLs might have been anonymized. Add: isbn, doi, website, ssrn, s2cid, authors 1-1. Removed proxy/dead URL that duplicated identifier. Removed parameters. Formatted dashes. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Whoop whoop pull up | Category:Malware | #UCB_Category 16/41
Line 1: Line 1:
[[File:Tor_Stinks.pdf|thumb|'Tor Stinks' [[NSA]] presentation |page=7]]
[[File:Tor_Stinks.pdf|thumb|'Tor Stinks' [[NSA]] presentation |page=7]]
'''Evercookie''' (also known as supercookie<ref name=":0">{{Cite journal|last1=Bujlow|first1=Tomasz|last2=Carela-Espanol|first2=Valentin|last3=Lee|first3=Beom-Ryeol|last4=Barlet-Ros|first4=Pere|date=2017|title=A Survey on Web Tracking: Mechanisms, Implications, and Defenses|url=http://dx.doi.org/10.1109/jproc.2016.2637878|journal=Proceedings of the IEEE|volume=105|issue=8|pages=1476–1510|doi=10.1109/jproc.2016.2637878|hdl=2117/108437|s2cid=2662250|issn=0018-9219|hdl-access=free}}</ref>) is a [[JavaScript]] [[API|application programming interface (API)]] that identifies and reproduces intentionally deleted cookies on the clients' browser storage.<ref name=":3">{{Cite journal|last1=Acar|first1=Gunes|last2=Eubank|first2=Christian|last3=Englehardt|first3=Steven|last4=Juarez|first4=Marc|last5=Narayanan|first5=Arvind|last6=Diaz|first6=Claudia|date=2014|title=The Web Never Forgets|url=http://dx.doi.org/10.1145/2660267.2660347|journal=Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14|pages=674–689|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/2660267.2660347|isbn=978-1-4503-2957-6|s2cid=8127620}}</ref> It was created by [[Samy Kamkar]] in 2010 to demonstrate the possible infiltration from the websites that use respawning.<ref name=":4">{{Cite journal|last1=Bashir|first1=Muhammad Ahmad|last2=Wilson|first2=Christo|date=2018-10-01|title=Diffusion of User Tracking Data in the Online Advertising Ecosystem|url=http://dx.doi.org/10.1515/popets-2018-0033|journal=Proceedings on Privacy Enhancing Technologies|volume=2018|issue=4|pages=85–103|doi=10.1515/popets-2018-0033|s2cid=52088002|issn=2299-0984|doi-access=free}}</ref> Websites that have adopted this mechanism can identify users even if they attempt to delete the previously stored cookies.<ref name=":2">{{Cite journal|last1=Kramár|first1=Tomáš|last2=Barla|first2=Michal|last3=Bieliková|first3=Mária|date=2013-02-01|title=Personalizing search using socially enhanced interest model, built from the stream of user's activity|url=https://dl.acm.org/doi/abs/10.5555/2481562.2481565|journal=Journal of Web Engineering|volume=12|issue=1–2|pages=65–92|issn=1540-9589}}</ref>
'''Evercookie''' (also known as supercookie<ref name=":0">{{Cite journal|last1=Bujlow|first1=Tomasz|last2=Carela-Espanol|first2=Valentin|last3=Lee|first3=Beom-Ryeol|last4=Barlet-Ros|first4=Pere|date=2017|title=A Survey on Web Tracking: Mechanisms, Implications, and Defenses|url=http://dx.doi.org/10.1109/jproc.2016.2637878|journal=Proceedings of the IEEE|volume=105|issue=8|pages=1476–1510|doi=10.1109/jproc.2016.2637878|hdl=2117/108437|s2cid=2662250|issn=0018-9219|hdl-access=free}}</ref>) is a [[JavaScript]] [[API|application programming interface (API)]] that identifies and reproduces intentionally deleted cookies on the clients' browser storage.<ref name=":3">{{Cite journal|last1=Acar|first1=Gunes|last2=Eubank|first2=Christian|last3=Englehardt|first3=Steven|last4=Juarez|first4=Marc|last5=Narayanan|first5=Arvind|last6=Diaz|first6=Claudia|date=2014|title=The Web Never Forgets|url=http://dx.doi.org/10.1145/2660267.2660347|journal=Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14|pages=674–689|location=New York, New York, USA|publisher=ACM Press|doi=10.1145/2660267.2660347|isbn=978-1-4503-2957-6|s2cid=8127620}}</ref> It was created by [[Samy Kamkar]] in 2010 to demonstrate the possible infiltration from the websites that use respawning.<ref name=":4">{{Cite journal|last1=Bashir|first1=Muhammad Ahmad|last2=Wilson|first2=Christo|date=2018-10-01|title=Diffusion of User Tracking Data in the Online Advertising Ecosystem|journal=Proceedings on Privacy Enhancing Technologies|volume=2018|issue=4|pages=85–103|doi=10.1515/popets-2018-0033|s2cid=52088002|issn=2299-0984|doi-access=free}}</ref> Websites that have adopted this mechanism can identify users even if they attempt to delete the previously stored cookies.<ref name=":2">{{Cite journal|last1=Kramár|first1=Tomáš|last2=Barla|first2=Michal|last3=Bieliková|first3=Mária|date=2013-02-01|title=Personalizing search using socially enhanced interest model, built from the stream of user's activity|url=https://dl.acm.org/doi/abs/10.5555/2481562.2481565|journal=Journal of Web Engineering|volume=12|issue=1–2|pages=65–92|issn=1540-9589}}</ref>


In 2013, [[Edward Snowden]] leaked a top-secret [[National Security Agency|NSA]] document that showed Evercookie can track [[Tor (anonymity network)|Tor]] (anonymity networks) users.<ref name=":1">{{Cite journal|last1=Kobusińska|first1=Anna|last2=Pawluczuk|first2=Kamil|last3=Brzeziński|first3=Jerzy|date=2018|title=Big Data fingerprinting information analytics for sustainability|url=http://dx.doi.org/10.1016/j.future.2017.12.061|journal=Future Generation Computer Systems|volume=86|pages=1321–1337|doi=10.1016/j.future.2017.12.061|issn=0167-739X}}</ref> Many popular companies use functionality similar to Evercookie to collect user information and track users.<ref name=":0" /><ref>{{Cite journal|last=Koop|first=Martin|last2=Tews|first2=Erik|last3=Katzenbeisser|first3=Stefan|date=2020-10-01|title=In-Depth Evaluation of Redirect Tracking and Link Usage|url=http://dx.doi.org/10.2478/popets-2020-0079|journal=Proceedings on Privacy Enhancing Technologies|volume=2020|issue=4|pages=394–413|doi=10.2478/popets-2020-0079|issn=2299-0984|doi-access=free}}</ref> Further research on fingerprinting and search engines also draws inspiration from Evercookie's ability to track a user persistently.<ref name=":2" /><ref name=":1" /><ref>{{Cite journal|last=Al-Fannah|first=Nasser Mohammed|last2=Mitchell|first2=Chris|date=2020-01-07|title=Too little too late: can we control browser fingerprinting?|url=http://dx.doi.org/10.1108/jic-04-2019-0067|journal=Journal of Intellectual Capital|volume=21|issue=2|pages=165–180|doi=10.1108/jic-04-2019-0067|issn=1469-1930}}</ref>
In 2013, [[Edward Snowden]] leaked a top-secret [[National Security Agency|NSA]] document that showed Evercookie can track [[Tor (anonymity network)|Tor]] (anonymity networks) users.<ref name=":1">{{Cite journal|last1=Kobusińska|first1=Anna|last2=Pawluczuk|first2=Kamil|last3=Brzeziński|first3=Jerzy|date=2018|title=Big Data fingerprinting information analytics for sustainability|url=http://dx.doi.org/10.1016/j.future.2017.12.061|journal=Future Generation Computer Systems|volume=86|pages=1321–1337|doi=10.1016/j.future.2017.12.061|s2cid=49646910|issn=0167-739X}}</ref> Many popular companies use functionality similar to Evercookie to collect user information and track users.<ref name=":0" /><ref>{{Cite journal|last1=Koop|first1=Martin|last2=Tews|first2=Erik|last3=Katzenbeisser|first3=Stefan|date=2020-10-01|title=In-Depth Evaluation of Redirect Tracking and Link Usage|journal=Proceedings on Privacy Enhancing Technologies|volume=2020|issue=4|pages=394–413|doi=10.2478/popets-2020-0079|issn=2299-0984|doi-access=free}}</ref> Further research on fingerprinting and search engines also draws inspiration from Evercookie's ability to track a user persistently.<ref name=":2" /><ref name=":1" /><ref>{{Cite journal|last1=Al-Fannah|first1=Nasser Mohammed|last2=Mitchell|first2=Chris|date=2020-01-07|title=Too little too late: can we control browser fingerprinting?|url=http://dx.doi.org/10.1108/jic-04-2019-0067|journal=Journal of Intellectual Capital|volume=21|issue=2|pages=165–180|doi=10.1108/jic-04-2019-0067|s2cid=212957853|issn=1469-1930}}</ref>


==Background==
==Background==
There are three commonly used data storages, including HTTP cookies, flash cookies, HTML5 Storage, and others.<ref name=":0" /><ref>{{Cite web|last=Zhiju|first=Yang|last2=Chuan|first2=Yue|date=2020-04-01|title=A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments|url=https://doaj.org/|access-date=2020-12-11|website=Proceedings on Privacy Enhancing Technologies|language=en}}</ref> When the user visits a website for the first time, the web server may generate a unique identifier and store it on the user's browser or local space.<ref name=":5">{{Cite journal|last=Yue|first=Chuan|last2=Xie|first2=Mengjun|last3=Wang|first3=Haining|date=September 2010|title=An automatic HTTP cookie management system|url=http://dx.doi.org/10.1016/j.comnet.2010.03.006|journal=Computer Networks|volume=54|issue=13|pages=2182–2198|doi=10.1016/j.comnet.2010.03.006|issn=1389-1286}}</ref> The website can read and identify the user in its future visits with the stored identifier, and the website can save user's preferences and display marketing advertisements.<ref name=":5" /> Due to privacy concerns, all major browsers include mechanisms for deleting and/or refusing cookies from websites.<ref name=":5" /><ref>{{Cite journal|last=fouad|first=Imane|last2=Bielova|first2=Nataliia|last3=Legout|first3=Arnaud|last4=Sarafijanovic-Djukic|first4=Natasa|date=2020-04-01|title=Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels|url=http://dx.doi.org/10.2478/popets-2020-0038|journal=Proceedings on Privacy Enhancing Technologies|volume=2020|issue=2|pages=499–518|doi=10.2478/popets-2020-0038|issn=2299-0984|doi-access=free}}</ref>
There are three commonly used data storages, including HTTP cookies, flash cookies, HTML5 Storage, and others.<ref name=":0" /><ref>{{Cite web|last1=Zhiju|first1=Yang|last2=Chuan|first2=Yue|date=2020-04-01|title=A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments|url=https://doaj.org/|access-date=2020-12-11|website=Proceedings on Privacy Enhancing Technologies|language=en}}</ref> When the user visits a website for the first time, the web server may generate a unique identifier and store it on the user's browser or local space.<ref name=":5">{{Cite journal|last1=Yue|first1=Chuan|last2=Xie|first2=Mengjun|last3=Wang|first3=Haining|date=September 2010|title=An automatic HTTP cookie management system|url=http://dx.doi.org/10.1016/j.comnet.2010.03.006|journal=Computer Networks|volume=54|issue=13|pages=2182–2198|doi=10.1016/j.comnet.2010.03.006|issn=1389-1286}}</ref> The website can read and identify the user in its future visits with the stored identifier, and the website can save user's preferences and display marketing advertisements.<ref name=":5" /> Due to privacy concerns, all major browsers include mechanisms for deleting and/or refusing cookies from websites.<ref name=":5" /><ref>{{Cite journal|last1=fouad|first1=Imane|last2=Bielova|first2=Nataliia|last3=Legout|first3=Arnaud|last4=Sarafijanovic-Djukic|first4=Natasa|date=2020-04-01|title=Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels|journal=Proceedings on Privacy Enhancing Technologies|volume=2020|issue=2|pages=499–518|doi=10.2478/popets-2020-0038|issn=2299-0984|doi-access=free}}</ref>


In response to the users' increased unwillingness to accept cookies, many websites employ methods to circumvent users' deletion of cookies.<ref>{{Cite journal|last=Cook|first=John|last2=Nithyanand|first2=Rishab|last3=Shafiq|first3=Zubair|date=2020-01-01|title=Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding|url=http://dx.doi.org/10.2478/popets-2020-0005|journal=Proceedings on Privacy Enhancing Technologies|volume=2020|issue=1|pages=65–82|doi=10.2478/popets-2020-0005|issn=2299-0984|doi-access=free}}</ref> Started from 2009, many research teams found popular websites used flash cookies, ETags, and various other data storage to rebuild the deleted cookies by users, including hulu.com, foxnews.com, spotify.com, etc.<ref name=":0" /><ref name=":6">{{Cite journal|last=Acar|first=Gunes|last2=Eubank|first2=Christian|last3=Englehardt|first3=Steven|last4=Juarez|first4=Marc|last5=Narayanan|first5=Arvind|last6=Diaz|first6=Claudia|date=2014|title=The Web Never Forgets: Persistent Tracking Mechanisms in the Wild|url=http://dl.acm.org/citation.cfm?doid=2660267.2660347|journal=Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14|language=en|location=Scottsdale, Arizona, USA|publisher=ACM Press|pages=674–689|doi=10.1145/2660267.2660347|isbn=978-1-4503-2957-6}}</ref><ref>{{Cite journal|last=Soltani|first=Ashkan|last2=Canty|first2=Shannon|last3=Mayo|first3=Quentin|last4=Thomas|first4=Lauren|last5=Hoofnagle|first5=Chris Jay|date=2009-08-10|title=Flash Cookies and Privacy|url=https://papers.ssrn.com/abstract=1446862|language=en|location=Rochester, NY}}</ref><ref name=":7">{{Cite journal|last=Ayenson|first=Mika D.|last2=Wambach|first2=Dietrich James|last3=Soltani|first3=Ashkan|last4=Good|first4=Nathan|last5=Hoofnagle|first5=Chris Jay|date=2011-07-29|title=Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning|url=https://papers.ssrn.com/abstract=1898390|language=en|location=Rochester, NY}}</ref> In 2010, Samy Kamkar, a Californian programmer, built an Evercookie project to further illustrate the tracking mechanism with respawning across various storage mechanisms on browsers.<ref name=":4" />
In response to the users' increased unwillingness to accept cookies, many websites employ methods to circumvent users' deletion of cookies.<ref>{{Cite journal|last1=Cook|first1=John|last2=Nithyanand|first2=Rishab|last3=Shafiq|first3=Zubair|date=2020-01-01|title=Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding|journal=Proceedings on Privacy Enhancing Technologies|volume=2020|issue=1|pages=65–82|doi=10.2478/popets-2020-0005|issn=2299-0984|doi-access=free}}</ref> Started from 2009, many research teams found popular websites used flash cookies, ETags, and various other data storage to rebuild the deleted cookies by users, including hulu.com, foxnews.com, spotify.com, etc.<ref name=":0" /><ref name=":6">{{Cite journal|last1=Acar|first1=Gunes|last2=Eubank|first2=Christian|last3=Englehardt|first3=Steven|last4=Juarez|first4=Marc|last5=Narayanan|first5=Arvind|last6=Diaz|first6=Claudia|date=2014|title=The Web Never Forgets: Persistent Tracking Mechanisms in the Wild|url=http://dl.acm.org/citation.cfm?doid=2660267.2660347|journal=Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14|language=en|location=Scottsdale, Arizona, USA|publisher=ACM Press|pages=674–689|doi=10.1145/2660267.2660347|isbn=978-1-4503-2957-6|s2cid=8127620}}</ref><ref>{{Cite journal|last1=Soltani|first1=Ashkan|last2=Canty|first2=Shannon|last3=Mayo|first3=Quentin|last4=Thomas|first4=Lauren|last5=Hoofnagle|first5=Chris Jay|date=2009-08-10|title=Flash Cookies and Privacy|url=https://papers.ssrn.com/abstract=1446862|language=en|location=Rochester, NY|ssrn=1446862}}</ref><ref name=":7">{{Cite journal|last1=Ayenson|first1=Mika D.|last2=Wambach|first2=Dietrich James|last3=Soltani|first3=Ashkan|last4=Good|first4=Nathan|last5=Hoofnagle|first5=Chris Jay|date=2011-07-29|title=Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning|url=https://papers.ssrn.com/abstract=1898390|language=en|location=Rochester, NY|ssrn=1898390}}</ref> In 2010, Samy Kamkar, a Californian programmer, built an Evercookie project to further illustrate the tracking mechanism with respawning across various storage mechanisms on browsers.<ref name=":4" />


==Description==
==Description==


Evercookie is created with malicious software in Javascript coding, and it is intended to always identify users even after they have attempted to delete the cookies on their servers.<ref name=":9">{{Cite journal|last=Andrés|first=José Angel González|date=2011-07-01|title=Identity Denial in Internet|url=http://dx.doi.org/10.5211/iys.10.article6|journal=Inteligencia y Seguridad|volume=2011|issue=10|pages=75–101|doi=10.5211/iys.10.article6|issn=1887-293X}}</ref> [[Samy Kamkar]] released v0.4 beta of the evercookie on September 13, 2010, as an [[Open-source license|open source]].<ref name=":8">{{cite web|title=Samy Kamkar - Evercookie|url=http://www.samy.pl/evercookie}}</ref><ref>{{cite web | title=Evercookie source code | url=https://github.com/samyk/evercookie/commits/master| date=2010-10-13 | access-date=2010-10-28 }}</ref><ref>{{cite web | title=Schneier on Security - Evercookies | url=http://www.schneier.com/blog/archives/2010/09/evercookies.html | date=2010-09-23 | access-date=2010-10-28 }}</ref> This evercookie javascript does not limit to respawning deleted HTTP cookies, but for any storage on browsers.<ref name=":8" /> When a browser visits a website with evercookie API on its server, the web server would generate an identifier and store it on various storage mechanisms available on that browser.<ref name=":3" /> If the user removes some but not all stored identifiers on the browser and revisit the website, the web server retrieves the identifier from remaining stored capacities that the user fails to delete.<ref name=":8" /> Then the web server will copy and restore this identifier to the previously cleared storage capacities.<ref>{{Citation|title=Tackling Cross-Site Scripting (XSS) Attacks in Cyberspace|date=2015-10-06|url=http://dx.doi.org/10.1201/b19311-18|work=Securing Cyber-Physical Systems|pages=350–367|publisher=CRC Press|isbn=978-0-429-09104-9|access-date=2020-12-11}}</ref>
Evercookie is created with malicious software in Javascript coding, and it is intended to always identify users even after they have attempted to delete the cookies on their servers.<ref name=":9">{{Cite journal|last=Andrés|first=José Angel González|date=2011-07-01|title=Identity Denial in Internet|url=http://dx.doi.org/10.5211/iys.10.article6|journal=Inteligencia y Seguridad|volume=2011|issue=10|pages=75–101|doi=10.5211/iys.10.article6|issn=1887-293X}}</ref> [[Samy Kamkar]] released v0.4 beta of the evercookie on September 13, 2010, as an [[Open-source license|open source]].<ref name=":8">{{cite web|title=Samy Kamkar - Evercookie|url=http://www.samy.pl/evercookie}}</ref><ref>{{cite web | title=Evercookie source code | website=[[GitHub]]| url=https://github.com/samyk/evercookie/commits/master| date=2010-10-13 | access-date=2010-10-28 }}</ref><ref>{{cite web | title=Schneier on Security - Evercookies | url=http://www.schneier.com/blog/archives/2010/09/evercookies.html | date=2010-09-23 | access-date=2010-10-28 }}</ref> This evercookie javascript does not limit to respawning deleted HTTP cookies, but for any storage on browsers.<ref name=":8" /> When a browser visits a website with evercookie API on its server, the web server would generate an identifier and store it on various storage mechanisms available on that browser.<ref name=":3" /> If the user removes some but not all stored identifiers on the browser and revisit the website, the web server retrieves the identifier from remaining stored capacities that the user fails to delete.<ref name=":8" /> Then the web server will copy and restore this identifier to the previously cleared storage capacities.<ref>{{Citation|title=Tackling Cross-Site Scripting (XSS) Attacks in Cyberspace|date=2015-10-06|url=http://dx.doi.org/10.1201/b19311-18|work=Securing Cyber-Physical Systems|pages=350–367|publisher=CRC Press|doi=10.1201/b19311-18|isbn=978-0-429-09104-9|access-date=2020-12-11}}</ref>


By abusing the various available storage mechanisms, evercookie creates persistent data identifiers, because users are not likely to clear all storing mechanisms.<ref>{{cite web | title=It is possible to kill the evercookie | url=https://arstechnica.com/security/news/2010/10/it-is-possible-to-kill-the-evercookie.ars | date=2010-10-27}}</ref> From the list provided by Samy Kamkar,<ref name=":8" /> 17 storage mechanisms could be used for the v0.4 beta evercookie when they are available on browsers:
By abusing the various available storage mechanisms, evercookie creates persistent data identifiers, because users are not likely to clear all storing mechanisms.<ref>{{cite web | title=It is possible to kill the evercookie | url=https://arstechnica.com/security/news/2010/10/it-is-possible-to-kill-the-evercookie.ars | date=2010-10-27}}</ref> From the list provided by Samy Kamkar,<ref name=":8" /> 17 storage mechanisms could be used for the v0.4 beta evercookie when they are available on browsers:
Line 35: Line 35:
Samy Kamkar claimed he did not intend to use this evercookie project to violate Internet user privacy or sell to any parties for commercial use. However, it serves as an inspiration for other commercial websites that later implement similar mechanisms to restore user-deleted cookies. The evercookie project is an open source, and everyone can access and examine it. The project incorporates HTML5 as one of the storage mechanisms, which was released 6 months before the project and gained public attentions due to its added persistency. Kamkar wished his project could demonstrate how users' privacy can be infiltered by contemporary tracking tools.<ref>{{Cite news|last=Vega|first=Tanzina|date=2010-10-11|title=New Web Code Draws Concern Over Privacy Risks (Published 2010)|language=en-US|work=The New York Times|url=https://www.nytimes.com/2010/10/11/business/media/11privacy.html|access-date=2020-12-06|issn=0362-4331}}</ref> So far, Firefox browser plug-in "Anonymizer Nevercookie" can block evercookie respawning.<ref name=":9" />
Samy Kamkar claimed he did not intend to use this evercookie project to violate Internet user privacy or sell to any parties for commercial use. However, it serves as an inspiration for other commercial websites that later implement similar mechanisms to restore user-deleted cookies. The evercookie project is an open source, and everyone can access and examine it. The project incorporates HTML5 as one of the storage mechanisms, which was released 6 months before the project and gained public attentions due to its added persistency. Kamkar wished his project could demonstrate how users' privacy can be infiltered by contemporary tracking tools.<ref>{{Cite news|last=Vega|first=Tanzina|date=2010-10-11|title=New Web Code Draws Concern Over Privacy Risks (Published 2010)|language=en-US|work=The New York Times|url=https://www.nytimes.com/2010/10/11/business/media/11privacy.html|access-date=2020-12-06|issn=0362-4331}}</ref> So far, Firefox browser plug-in "Anonymizer Nevercookie" can block evercookie respawning.<ref name=":9" />


The storage mechanisms incorporated in the evercookie project are constantly being updated, adding evercookie's persistency. As it incorporates many existing tracking methods, evercookie provides an advanced data tracking tool that reduces the redundancy of data collection methods by many commercial websites.<ref>{{Cite journal|last=Nielsen|first=Janne|date=2019-10-02|title=Experimenting with computational methods for large-scale studies of tracking technologies in web archives|url=http://dx.doi.org/10.1080/24701475.2019.1671074|journal=Internet Histories|volume=3|issue=3-4|pages=293–315|doi=10.1080/24701475.2019.1671074|issn=2470-1475}}</ref><ref>{{Cite journal|last=Samarasinghe|first=Nayanamana|last2=Mannan|first2=Mohammad|date=November 2019|title=Towards a global perspective on web tracking|url=http://dx.doi.org/10.1016/j.cose.2019.101569|journal=Computers & Security|volume=87|pages=101569|doi=10.1016/j.cose.2019.101569|issn=0167-4048}}</ref> With its inspiration, an increasing number of commercial websites used the idea of evercookie, and they add upon it by incorporating new storage vectors. In 2014, a research team at the Princeton University conducted a large scale study of three persistent tracking tools: evercookie, canvas fingerprinting, and cookie syncing. The team crawled and analyzed the top 100,000 Alexa websites, and it detects a new storage vector, IndexedDB, that is incorporated into evercookie mechanism and used by weibo.com. The team claimed this is the first detection of commercial use for indexedDB.<ref name=":6" /> Moreover, the team discovers cookie syncing is used in conjunction with evercookie. Cookie syncing allows data sharing between different storage mechanisms, facilitating evercookie's respawning process in different storage locations on users' browsers. The team also discovered instances of flash cookies respawning HTTP cookies, and HTTP cookies respawning the flash cookies on the commercial websites. Those two mechanims are different from the evercookie project in terms of the number of storage mechanisms employed, but they possess the same ideology. Among the sites that the research team crawled, 10 out of 200 websites used flash cookies to rebuild HTTP cookies. 9 of the observed sites belong to China, including sina.com.cn, weibo.com, hao123.com, sohu.com, ifeng.com, youku.com, 56.com, letv.com, and tudo.com). The other one website is yandex.ru, a top search engine in Russia.
The storage mechanisms incorporated in the evercookie project are constantly being updated, adding evercookie's persistency. As it incorporates many existing tracking methods, evercookie provides an advanced data tracking tool that reduces the redundancy of data collection methods by many commercial websites.<ref>{{Cite journal|last=Nielsen|first=Janne|date=2019-10-02|title=Experimenting with computational methods for large-scale studies of tracking technologies in web archives|url=http://dx.doi.org/10.1080/24701475.2019.1671074|journal=Internet Histories|volume=3|issue=3–4|pages=293–315|doi=10.1080/24701475.2019.1671074|s2cid=208121899|issn=2470-1475}}</ref><ref>{{Cite journal|last1=Samarasinghe|first1=Nayanamana|last2=Mannan|first2=Mohammad|date=November 2019|title=Towards a global perspective on web tracking|url=http://dx.doi.org/10.1016/j.cose.2019.101569|journal=Computers & Security|volume=87|pages=101569|doi=10.1016/j.cose.2019.101569|s2cid=199582679|issn=0167-4048}}</ref> With its inspiration, an increasing number of commercial websites used the idea of evercookie, and they add upon it by incorporating new storage vectors. In 2014, a research team at the Princeton University conducted a large scale study of three persistent tracking tools: evercookie, canvas fingerprinting, and cookie syncing. The team crawled and analyzed the top 100,000 Alexa websites, and it detects a new storage vector, IndexedDB, that is incorporated into evercookie mechanism and used by weibo.com. The team claimed this is the first detection of commercial use for indexedDB.<ref name=":6" /> Moreover, the team discovers cookie syncing is used in conjunction with evercookie. Cookie syncing allows data sharing between different storage mechanisms, facilitating evercookie's respawning process in different storage locations on users' browsers. The team also discovered instances of flash cookies respawning HTTP cookies, and HTTP cookies respawning the flash cookies on the commercial websites. Those two mechanims are different from the evercookie project in terms of the number of storage mechanisms employed, but they possess the same ideology. Among the sites that the research team crawled, 10 out of 200 websites used flash cookies to rebuild HTTP cookies. 9 of the observed sites belong to China, including sina.com.cn, weibo.com, hao123.com, sohu.com, ifeng.com, youku.com, 56.com, letv.com, and tudo.com). The other one website is yandex.ru, a top search engine in Russia.


== Applications ==
== Applications ==
Line 48: Line 48:


=== NSA Tor Tracking ===
=== NSA Tor Tracking ===
In 2013, an internal National Security Agency ([[National Security Agency|NSA]])'s presentation was revealed by Edward Snowden, suggesting Evercookie's use in government surveillance to track Tor users.<ref name=":1" /><ref>{{Cite web|title=Tor stinks|url=https://www.aclu.org/sites/default/files/assets/tor_stinks.pdf|website=edwardsnowden.com}}</ref> The TOR Blog responded to this leaked document in one post, assuring that TOR Browser Bundles and Tails operating system provide strong protections against evercookie.<ref>{{Cite journal|date=August 2013|title=TOR attacked – possibly by the NSA|url=http://dx.doi.org/10.1016/s1353-4858(13)70086-2|journal=Network Security|volume=2013|issue=8|pages=1–2|doi=10.1016/s1353-4858(13)70086-2|issn=1353-4858}}</ref><ref>{{Cite journal|last=Vlajic|first=Natalija|last2=Madani|first2=Pooria|last3=Nguyen|first3=Ethan|date=2018-04-03|title=Clickstream tracking of TOR users: may be easier than you think|url=http://dx.doi.org/10.1080/23742917.2018.1518060|journal=Journal of Cyber Security Technology|volume=2|issue=2|pages=92–108|doi=10.1080/23742917.2018.1518060|issn=2374-2917}}</ref>
In 2013, an internal National Security Agency ([[National Security Agency|NSA]])'s presentation was revealed by Edward Snowden, suggesting Evercookie's use in government surveillance to track Tor users.<ref name=":1" /><ref>{{Cite web|title=Tor stinks|url=https://www.aclu.org/sites/default/files/assets/tor_stinks.pdf|website=edwardsnowden.com}}</ref> The TOR Blog responded to this leaked document in one post, assuring that TOR Browser Bundles and Tails operating system provide strong protections against evercookie.<ref>{{Cite journal|date=August 2013|title=TOR attacked – possibly by the NSA|url=http://dx.doi.org/10.1016/s1353-4858(13)70086-2|journal=Network Security|volume=2013|issue=8|pages=1–2|doi=10.1016/s1353-4858(13)70086-2|issn=1353-4858}}</ref><ref>{{Cite journal|last1=Vlajic|first1=Natalija|last2=Madani|first2=Pooria|last3=Nguyen|first3=Ethan|date=2018-04-03|title=Clickstream tracking of TOR users: may be easier than you think|url=http://dx.doi.org/10.1080/23742917.2018.1518060|journal=Journal of Cyber Security Technology|volume=2|issue=2|pages=92–108|doi=10.1080/23742917.2018.1518060|s2cid=169615236|issn=2374-2917}}</ref>


== Public attitudes towards data tracking ==
== Public attitudes towards data tracking ==
Evercookie, and many other emerged new technologies in persistent data tracking, is a response of Internet users' tendency of deleting cookie storage. In this system of information exchange, some consumers believe they are being compensated with greater personalization information, or sometimes even financial compensation from the related companies.<ref>{{Cite journal|last=Martin|first=Kelly D.|last2=Murphy|first2=Patrick E.|date=2016-09-22|title=The role of data privacy in marketing|url=http://dx.doi.org/10.1007/s11747-016-0495-4|journal=Journal of the Academy of Marketing Science|volume=45|issue=2|pages=135–155|doi=10.1007/s11747-016-0495-4|issn=0092-0703}}</ref> Recent related research, however, shows a gap between the expectations of the consumer and marketers.<ref>{{Cite journal|last=Chen|first=G.|last2=Cox|first2=J. H.|last3=Uluagac|first3=A. S.|last4=Copeland|first4=J. A.|date=Third Quarter 2016|title=In-Depth Survey of Digital Advertising Technologies|url=https://ieeexplore.ieee.org/document/7390161/|journal=IEEE Communications Surveys and Tutorials|volume=18|issue=3|pages=2124–2148|doi=10.1109/COMST.2016.2519912|issn=1553-877X}}</ref> A Wall Street Journal showed 72% felt being offended when they see targeted advertisements while browsing the Internet. Another survery showed 66% of Americans felt negative about how marketers track their data to generate individualized information. In another survey, 52% of respondents would like to turn off behavioral advertising.<ref>{{Cite journal|last=Korolova|first=A.|date=December 2010|title=Privacy Violations Using Microtargeted Ads: A Case Study|url=https://ieeexplore.ieee.org/document/5693335/|journal=2010 IEEE International Conference on Data Mining Workshops|pages=474–482|doi=10.1109/ICDMW.2010.137}}</ref> The behavior of data tracking persisted, however, as it provides knowledge to all market participants, further capitalization of this knowledge into marketable products, and operation in the final marketing actions.<ref>{{Cite journal|last=Mellet|first=Kevin|last2=Beauvisage|first2=Thomas|date=2019-09-02|title=Cookie monsters. Anatomy of a digital market infrastructure|url=http://dx.doi.org/10.1080/10253866.2019.1661246|journal=Consumption Markets & Culture|volume=23|issue=2|pages=110–129|doi=10.1080/10253866.2019.1661246|issn=1025-3866}}</ref><ref>{{Citation|title=Dataveillance and Countervailance|date=2013|url=http://dx.doi.org/10.7551/mitpress/9302.003.0009|work="Raw Data" Is an Oxymoron|publisher=The MIT Press|isbn=978-0-262-31232-5|access-date=2020-12-11}}</ref>
Evercookie, and many other emerged new technologies in persistent data tracking, is a response of Internet users' tendency of deleting cookie storage. In this system of information exchange, some consumers believe they are being compensated with greater personalization information, or sometimes even financial compensation from the related companies.<ref>{{Cite journal|last1=Martin|first1=Kelly D.|last2=Murphy|first2=Patrick E.|date=2016-09-22|title=The role of data privacy in marketing|url=http://dx.doi.org/10.1007/s11747-016-0495-4|journal=Journal of the Academy of Marketing Science|volume=45|issue=2|pages=135–155|doi=10.1007/s11747-016-0495-4|s2cid=168554897|issn=0092-0703}}</ref> Recent related research, however, shows a gap between the expectations of the consumer and marketers.<ref>{{Cite journal|last1=Chen|first1=G.|last2=Cox|first2=J. H.|last3=Uluagac|first3=A. S.|last4=Copeland|first4=J. A.|date=Third Quarter 2016|title=In-Depth Survey of Digital Advertising Technologies|url=https://ieeexplore.ieee.org/document/7390161|journal=IEEE Communications Surveys and Tutorials|volume=18|issue=3|pages=2124–2148|doi=10.1109/COMST.2016.2519912|s2cid=32263374|issn=1553-877X}}</ref> A Wall Street Journal showed 72% felt being offended when they see targeted advertisements while browsing the Internet. Another survery showed 66% of Americans felt negative about how marketers track their data to generate individualized information. In another survey, 52% of respondents would like to turn off behavioral advertising.<ref>{{Cite journal|last=Korolova|first=A.|date=December 2010|title=Privacy Violations Using Microtargeted Ads: A Case Study|url=https://ieeexplore.ieee.org/document/5693335|journal=2010 IEEE International Conference on Data Mining Workshops|pages=474–482|doi=10.1109/ICDMW.2010.137|isbn=978-1-4244-9244-2|s2cid=206785467}}</ref> The behavior of data tracking persisted, however, as it provides knowledge to all market participants, further capitalization of this knowledge into marketable products, and operation in the final marketing actions.<ref>{{Cite journal|last1=Mellet|first1=Kevin|last2=Beauvisage|first2=Thomas|date=2019-09-02|title=Cookie monsters. Anatomy of a digital market infrastructure|url=http://dx.doi.org/10.1080/10253866.2019.1661246|journal=Consumption Markets & Culture|volume=23|issue=2|pages=110–129|doi=10.1080/10253866.2019.1661246|s2cid=203058303|issn=1025-3866}}</ref><ref>{{Citation|title=Dataveillance and Countervailance|date=2013|url=http://dx.doi.org/10.7551/mitpress/9302.003.0009|work="Raw Data" Is an Oxymoron|publisher=The MIT Press|doi=10.7551/mitpress/9302.003.0009|isbn=978-0-262-31232-5|access-date=2020-12-11}}</ref>


==See also==
==See also==

Revision as of 02:09, 1 January 2022

'Tor Stinks' NSA presentation

Evercookie (also known as supercookie[1]) is a JavaScript application programming interface (API) that identifies and reproduces intentionally deleted cookies on the clients' browser storage.[2] It was created by Samy Kamkar in 2010 to demonstrate the possible infiltration from the websites that use respawning.[3] Websites that have adopted this mechanism can identify users even if they attempt to delete the previously stored cookies.[4]

In 2013, Edward Snowden leaked a top-secret NSA document that showed Evercookie can track Tor (anonymity networks) users.[5] Many popular companies use functionality similar to Evercookie to collect user information and track users.[1][6] Further research on fingerprinting and search engines also draws inspiration from Evercookie's ability to track a user persistently.[4][5][7]

Background

There are three commonly used data storages, including HTTP cookies, flash cookies, HTML5 Storage, and others.[1][8] When the user visits a website for the first time, the web server may generate a unique identifier and store it on the user's browser or local space.[9] The website can read and identify the user in its future visits with the stored identifier, and the website can save user's preferences and display marketing advertisements.[9] Due to privacy concerns, all major browsers include mechanisms for deleting and/or refusing cookies from websites.[9][10]

In response to the users' increased unwillingness to accept cookies, many websites employ methods to circumvent users' deletion of cookies.[11] Started from 2009, many research teams found popular websites used flash cookies, ETags, and various other data storage to rebuild the deleted cookies by users, including hulu.com, foxnews.com, spotify.com, etc.[1][12][13][14] In 2010, Samy Kamkar, a Californian programmer, built an Evercookie project to further illustrate the tracking mechanism with respawning across various storage mechanisms on browsers.[3]

Description

Evercookie is created with malicious software in Javascript coding, and it is intended to always identify users even after they have attempted to delete the cookies on their servers.[15] Samy Kamkar released v0.4 beta of the evercookie on September 13, 2010, as an open source.[16][17][18] This evercookie javascript does not limit to respawning deleted HTTP cookies, but for any storage on browsers.[16] When a browser visits a website with evercookie API on its server, the web server would generate an identifier and store it on various storage mechanisms available on that browser.[2] If the user removes some but not all stored identifiers on the browser and revisit the website, the web server retrieves the identifier from remaining stored capacities that the user fails to delete.[16] Then the web server will copy and restore this identifier to the previously cleared storage capacities.[19]

By abusing the various available storage mechanisms, evercookie creates persistent data identifiers, because users are not likely to clear all storing mechanisms.[20] From the list provided by Samy Kamkar,[16] 17 storage mechanisms could be used for the v0.4 beta evercookie when they are available on browsers:

Samy Kamkar claimed he did not intend to use this evercookie project to violate Internet user privacy or sell to any parties for commercial use. However, it serves as an inspiration for other commercial websites that later implement similar mechanisms to restore user-deleted cookies. The evercookie project is an open source, and everyone can access and examine it. The project incorporates HTML5 as one of the storage mechanisms, which was released 6 months before the project and gained public attentions due to its added persistency. Kamkar wished his project could demonstrate how users' privacy can be infiltered by contemporary tracking tools.[21] So far, Firefox browser plug-in "Anonymizer Nevercookie" can block evercookie respawning.[15]

The storage mechanisms incorporated in the evercookie project are constantly being updated, adding evercookie's persistency. As it incorporates many existing tracking methods, evercookie provides an advanced data tracking tool that reduces the redundancy of data collection methods by many commercial websites.[22][23] With its inspiration, an increasing number of commercial websites used the idea of evercookie, and they add upon it by incorporating new storage vectors. In 2014, a research team at the Princeton University conducted a large scale study of three persistent tracking tools: evercookie, canvas fingerprinting, and cookie syncing. The team crawled and analyzed the top 100,000 Alexa websites, and it detects a new storage vector, IndexedDB, that is incorporated into evercookie mechanism and used by weibo.com. The team claimed this is the first detection of commercial use for indexedDB.[12] Moreover, the team discovers cookie syncing is used in conjunction with evercookie. Cookie syncing allows data sharing between different storage mechanisms, facilitating evercookie's respawning process in different storage locations on users' browsers. The team also discovered instances of flash cookies respawning HTTP cookies, and HTTP cookies respawning the flash cookies on the commercial websites. Those two mechanims are different from the evercookie project in terms of the number of storage mechanisms employed, but they possess the same ideology. Among the sites that the research team crawled, 10 out of 200 websites used flash cookies to rebuild HTTP cookies. 9 of the observed sites belong to China, including sina.com.cn, weibo.com, hao123.com, sohu.com, ifeng.com, youku.com, 56.com, letv.com, and tudo.com). The other one website is yandex.ru, a top search engine in Russia.

Applications

A research team from the Slovak University of Technology proposed a mechanism for search engines to infer Internet users’ intended search words and produce personalized search results. Oftentimes the queries from Internet users contain multiple meanings and range across different fields. As a result, the displayed search results from the search engine contain a multitude of information, many of which are not related to the searcher. The authors proposed that searchers’ identity and user preference have a strong indication on the queries meaning and can greatly reduce the ambiguity of the search word. The research team built a metadata-based model to extract users’ information with evercookie, and they integrated this user interest model into the search engine to enhance personalization of the search result. The team was aware that traditional cookie can be easily deleted by experiment subjects thus lead to incomplete experiment data. The research team then utilized evercookie's persistency.[4]

Controversial applications

KISSMetrics Privacy Lawsuit

On Friday July 29, 2011, a research team at the University of California, Berkeley crawled the top 100 U.S. websites based upon QuantCast. The team found KISSmetrics, a third party website that provides marketing analytical tools, used HTTP cookies, Flash cookies, ETags, and some but not all storage mechanisms employed in Samy Kamkar's Evercookie project to respawn the user's deleted information.[1] Other popular websites, such as hulu.com and spotify.com, employed KISSmetrics to respawn HTML5 and HTTP first party cookies. The research team claimed this was the first time that Etag was observed to be used in commercial settings.[14]

On the same day of the report's publication, Hulu and Spotify announced their suspended use of KISSmetrics for further investigation.[24] Two consumers sued KISSmetrics on Friday about its violation of user privacy.[25] KISSMetrics revised its privacy policies during the weekend, indicating the company had fully respected customers' will if they chose not to be tracked. On August 4, 2011, KISSmetrics' CEO Hiten Shah denied KISSmetrics' implementation of evercookie and other tracking mechanisms mentioned in the report, and he claimed the company only used legitimate first party cookie trackers.[1] On October 19, 2012, KISSmetrics agreed to pay over $500,000 to settle the accusation and promised to refrain from using evercookie.[26][27]

NSA Tor Tracking

In 2013, an internal National Security Agency (NSA)'s presentation was revealed by Edward Snowden, suggesting Evercookie's use in government surveillance to track Tor users.[5][28] The TOR Blog responded to this leaked document in one post, assuring that TOR Browser Bundles and Tails operating system provide strong protections against evercookie.[29][30]

Public attitudes towards data tracking

Evercookie, and many other emerged new technologies in persistent data tracking, is a response of Internet users' tendency of deleting cookie storage. In this system of information exchange, some consumers believe they are being compensated with greater personalization information, or sometimes even financial compensation from the related companies.[31] Recent related research, however, shows a gap between the expectations of the consumer and marketers.[32] A Wall Street Journal showed 72% felt being offended when they see targeted advertisements while browsing the Internet. Another survery showed 66% of Americans felt negative about how marketers track their data to generate individualized information. In another survey, 52% of respondents would like to turn off behavioral advertising.[33] The behavior of data tracking persisted, however, as it provides knowledge to all market participants, further capitalization of this knowledge into marketable products, and operation in the final marketing actions.[34][35]

See also

References

  1. ^ a b c d e f Bujlow, Tomasz; Carela-Espanol, Valentin; Lee, Beom-Ryeol; Barlet-Ros, Pere (2017). "A Survey on Web Tracking: Mechanisms, Implications, and Defenses". Proceedings of the IEEE. 105 (8): 1476–1510. doi:10.1109/jproc.2016.2637878. hdl:2117/108437. ISSN 0018-9219. S2CID 2662250.
  2. ^ a b Acar, Gunes; Eubank, Christian; Englehardt, Steven; Juarez, Marc; Narayanan, Arvind; Diaz, Claudia (2014). "The Web Never Forgets". Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14. New York, New York, USA: ACM Press: 674–689. doi:10.1145/2660267.2660347. ISBN 978-1-4503-2957-6. S2CID 8127620.
  3. ^ a b Bashir, Muhammad Ahmad; Wilson, Christo (2018-10-01). "Diffusion of User Tracking Data in the Online Advertising Ecosystem". Proceedings on Privacy Enhancing Technologies. 2018 (4): 85–103. doi:10.1515/popets-2018-0033. ISSN 2299-0984. S2CID 52088002.
  4. ^ a b c Kramár, Tomáš; Barla, Michal; Bieliková, Mária (2013-02-01). "Personalizing search using socially enhanced interest model, built from the stream of user's activity". Journal of Web Engineering. 12 (1–2): 65–92. ISSN 1540-9589.
  5. ^ a b c Kobusińska, Anna; Pawluczuk, Kamil; Brzeziński, Jerzy (2018). "Big Data fingerprinting information analytics for sustainability". Future Generation Computer Systems. 86: 1321–1337. doi:10.1016/j.future.2017.12.061. ISSN 0167-739X. S2CID 49646910.
  6. ^ Koop, Martin; Tews, Erik; Katzenbeisser, Stefan (2020-10-01). "In-Depth Evaluation of Redirect Tracking and Link Usage". Proceedings on Privacy Enhancing Technologies. 2020 (4): 394–413. doi:10.2478/popets-2020-0079. ISSN 2299-0984.
  7. ^ Al-Fannah, Nasser Mohammed; Mitchell, Chris (2020-01-07). "Too little too late: can we control browser fingerprinting?". Journal of Intellectual Capital. 21 (2): 165–180. doi:10.1108/jic-04-2019-0067. ISSN 1469-1930. S2CID 212957853.
  8. ^ Zhiju, Yang; Chuan, Yue (2020-04-01). "A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments". Proceedings on Privacy Enhancing Technologies. Retrieved 2020-12-11.
  9. ^ a b c Yue, Chuan; Xie, Mengjun; Wang, Haining (September 2010). "An automatic HTTP cookie management system". Computer Networks. 54 (13): 2182–2198. doi:10.1016/j.comnet.2010.03.006. ISSN 1389-1286.
  10. ^ fouad, Imane; Bielova, Nataliia; Legout, Arnaud; Sarafijanovic-Djukic, Natasa (2020-04-01). "Missed by Filter Lists: Detecting Unknown Third-Party Trackers with Invisible Pixels". Proceedings on Privacy Enhancing Technologies. 2020 (2): 499–518. doi:10.2478/popets-2020-0038. ISSN 2299-0984.
  11. ^ Cook, John; Nithyanand, Rishab; Shafiq, Zubair (2020-01-01). "Inferring Tracker-Advertiser Relationships in the Online Advertising Ecosystem using Header Bidding". Proceedings on Privacy Enhancing Technologies. 2020 (1): 65–82. doi:10.2478/popets-2020-0005. ISSN 2299-0984.
  12. ^ a b Acar, Gunes; Eubank, Christian; Englehardt, Steven; Juarez, Marc; Narayanan, Arvind; Diaz, Claudia (2014). "The Web Never Forgets: Persistent Tracking Mechanisms in the Wild". Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14. Scottsdale, Arizona, USA: ACM Press: 674–689. doi:10.1145/2660267.2660347. ISBN 978-1-4503-2957-6. S2CID 8127620.
  13. ^ Soltani, Ashkan; Canty, Shannon; Mayo, Quentin; Thomas, Lauren; Hoofnagle, Chris Jay (2009-08-10). "Flash Cookies and Privacy". Rochester, NY. SSRN 1446862. {{cite journal}}: Cite journal requires |journal= (help)
  14. ^ a b Ayenson, Mika D.; Wambach, Dietrich James; Soltani, Ashkan; Good, Nathan; Hoofnagle, Chris Jay (2011-07-29). "Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning". Rochester, NY. SSRN 1898390. {{cite journal}}: Cite journal requires |journal= (help)
  15. ^ a b Andrés, José Angel González (2011-07-01). "Identity Denial in Internet". Inteligencia y Seguridad. 2011 (10): 75–101. doi:10.5211/iys.10.article6. ISSN 1887-293X.
  16. ^ a b c d "Samy Kamkar - Evercookie".
  17. ^ "Evercookie source code". GitHub. 2010-10-13. Retrieved 2010-10-28.
  18. ^ "Schneier on Security - Evercookies". 2010-09-23. Retrieved 2010-10-28.
  19. ^ "Tackling Cross-Site Scripting (XSS) Attacks in Cyberspace", Securing Cyber-Physical Systems, CRC Press, pp. 350–367, 2015-10-06, doi:10.1201/b19311-18, ISBN 978-0-429-09104-9, retrieved 2020-12-11
  20. ^ "It is possible to kill the evercookie". 2010-10-27.
  21. ^ Vega, Tanzina (2010-10-11). "New Web Code Draws Concern Over Privacy Risks (Published 2010)". The New York Times. ISSN 0362-4331. Retrieved 2020-12-06.
  22. ^ Nielsen, Janne (2019-10-02). "Experimenting with computational methods for large-scale studies of tracking technologies in web archives". Internet Histories. 3 (3–4): 293–315. doi:10.1080/24701475.2019.1671074. ISSN 2470-1475. S2CID 208121899.
  23. ^ Samarasinghe, Nayanamana; Mannan, Mohammad (November 2019). "Towards a global perspective on web tracking". Computers & Security. 87: 101569. doi:10.1016/j.cose.2019.101569. ISSN 0167-4048. S2CID 199582679.
  24. ^ "Researchers Call Out Websites for Tracking Users via Stealth Tactics". Berkeley Law. Retrieved 2020-12-06.
  25. ^ "KISSmetrics, Hulu Sued Over New Tracking Technology". www.mediapost.com. Retrieved 2020-12-06.
  26. ^ "KISSmetrics Settles Supercookies Lawsuit". www.mediapost.com. Retrieved 2020-12-06.
  27. ^ Drury, Alexandra (2012). "How Internet Users' Identities Are Being Tracked and Used". Tulane Journal of Technology & Intellectual Property. 15. ISSN 2169-4567.
  28. ^ "Tor stinks" (PDF). edwardsnowden.com.
  29. ^ "TOR attacked – possibly by the NSA". Network Security. 2013 (8): 1–2. August 2013. doi:10.1016/s1353-4858(13)70086-2. ISSN 1353-4858.
  30. ^ Vlajic, Natalija; Madani, Pooria; Nguyen, Ethan (2018-04-03). "Clickstream tracking of TOR users: may be easier than you think". Journal of Cyber Security Technology. 2 (2): 92–108. doi:10.1080/23742917.2018.1518060. ISSN 2374-2917. S2CID 169615236.
  31. ^ Martin, Kelly D.; Murphy, Patrick E. (2016-09-22). "The role of data privacy in marketing". Journal of the Academy of Marketing Science. 45 (2): 135–155. doi:10.1007/s11747-016-0495-4. ISSN 0092-0703. S2CID 168554897.
  32. ^ Chen, G.; Cox, J. H.; Uluagac, A. S.; Copeland, J. A. (Third Quarter 2016). "In-Depth Survey of Digital Advertising Technologies". IEEE Communications Surveys and Tutorials. 18 (3): 2124–2148. doi:10.1109/COMST.2016.2519912. ISSN 1553-877X. S2CID 32263374.
  33. ^ Korolova, A. (December 2010). "Privacy Violations Using Microtargeted Ads: A Case Study". 2010 IEEE International Conference on Data Mining Workshops: 474–482. doi:10.1109/ICDMW.2010.137. ISBN 978-1-4244-9244-2. S2CID 206785467.
  34. ^ Mellet, Kevin; Beauvisage, Thomas (2019-09-02). "Cookie monsters. Anatomy of a digital market infrastructure". Consumption Markets & Culture. 23 (2): 110–129. doi:10.1080/10253866.2019.1661246. ISSN 1025-3866. S2CID 203058303.
  35. ^ "Dataveillance and Countervailance", "Raw Data" Is an Oxymoron, The MIT Press, 2013, doi:10.7551/mitpress/9302.003.0009, ISBN 978-0-262-31232-5, retrieved 2020-12-11