Filters








11 Hits in 5.3 sec

My Cookie is a phoenix: detection, measurement, and lawfulness of cookie respawning with browser fingerprinting

Imane Fouad, Cristiana Santos, Arnaud Legout, Nataliia Bielova
2022 Proceedings on Privacy Enhancing Technologies  
To the best of our knowledge, our study is the first to detect and measure cookie respawning with browser and machine fingerprinting.  ...  Together with a legal scholar, we conclude that cookie respawning with browser fingerprinting lacks legal interpretation under the GDPR and the ePrivacy directive, but its use in practice may breach them  ...  As a result, cookie respawning with browser fingerprinting allows trackers to respawn deleted cookies, and also to link different browser fingerprints of the same user.  ... 
doi:10.56553/popets-2022-0063 fatcat:y4qliih2gzblfenwojmmk6oy7a

To Track or 'Do Not Track': Advancing Transparency and Individual Control in Online Behavioral Advertising

Omer Tene, Jules Polonetsky
2011 Social Science Research Network  
unknowingly re-entering the tracking domain. 229 Keep My Opt-Outs is itself cookie based-it deletes all cookies sent by registered domains and adds a DNT cookie for such domains. 230 Apple too added a  ...  ONLINE TRACKING DEVICES Online tracking technologies have been progressing rapidly, from cookies to "super cookies," 20 to browser fingerprinting and device identifiers.  ...  Accountability With the proliferation of cross-border data transfers and the advent of cloud computing, policymakers on both sides of the Atlantic have called for reiteration of the accountability principle  ... 
doi:10.2139/ssrn.1920505 fatcat:fifrwdkqbzhxtfm3ykupwecjkm

Digital Personae and Profiles in Law: Protecting Individuals' Rights in Online Contexts

Arnold Roosendaal
2013 Social Science Research Network  
Nevertheless, based on a literature study and conversations with experts in the relevant fields, the descriptions should be appropriate for the purposes of this study.  ...  With the author having a background in law, the research concerning other disciplines, such as sociology and philosophy, was based on handbooks and key literature in these disciplines. For the legal  ...  The individual is provided with an option, which is not a real choice. By analogy, in the context of cookie tracking, deleted cookies are respawned.  ... 
doi:10.2139/ssrn.2313576 fatcat:jt2vq3hpvbgeta4pz3awhfbxfy

Katz on a Hot Tin Roof - Saving the Fourth Amendment from Commercial Conditioning by Reviving Voluntariness in Disclosures to Third Parties

Mary Leary
2013 Social Science Research Network  
As a result, when an individual deletes the cookies on his computer automatically or manually (as part of a privacy protection process), these cookies may not be deleted. 28 In fact, they can be used  ...  / (discussing companies such as ThreatMetix which use device fingerprinting methodology to probe beyond mere cookies and browser data to identify the machine being used for online access in order to fight  ... 
doi:10.2139/ssrn.2253682 fatcat:qrr6aie4pff5pigwv2hnuseojy

Footprints Near the Surf: Individual Privacy Decisions in Online Contexts

Aleecia M. McDonald
2018
In my thesis I examine decisions made about threats from website data collection.  ...  In the course of multiple studies I use a variety of tools including lab-based studies, online studies, mental models interviews, economic analysis, and analysis of cookies used for tracking.  ...  I delete cookies to save space I delete cookies out of habit I delete cookies but only on shared computers I do not delete cookies because they make web pages load faster I do not delete cookies because  ... 
doi:10.1184/r1/6717041.v1 fatcat:rkyeie77fbgjnmsayd3hb2exou

Legal issues of user tracking technologies

Tanja Travnicek, Markus Haslinger
2022
und Fingerprinting-Verfahren.  ...  The conducted survey as well as the employed web scraping reveals, among others, the utilisation of first- and third-party cookies, other DOM storage methods, tracking via JS files and fingerprinting methods  ...  This particular Flash cookie was known to respawn HTTP cookies after deletion 62 .  ... 
doi:10.34726/hss.2022.80248 fatcat:5vktowktjnbktm52xgss7wwmum

Web browser fingerprinting : a framework for measuring the web browser

Vanja Culafic, Edgar Weippl, Martin Schmiedecker
2016
Browser fingerprinting is a process of identifying a user by means of collecting and comparing the distinguishing features of the browser.  ...  Furthermore, we implement an extensible fingerprinting framework that encompasses all fingerprinting methods from previous research and publish it online in order to collect browser fingerprints.  ...  While the cookies are separated from normal browsing sessions and deleted afterwards, browser fingerprint is still present, both in normal and private browsing sessions.  ... 
doi:10.34726/hss.2016.29603 fatcat:qsuq3i22mrdebk24o6q627xs2i

AdTech

Carina Pratsch, Peter Purgathofer
2020
During the exploration of adTech news sites repeatedly attracted attention with their large number of cookies and trackers.  ...  Quantitative data was collected about third party connections and with which elements the user came into contact, for example cookies, scripts or tracking pixel.  ...  Acknowledgements At this point I would like to thank my advisor Peter Purgathofer, for introducing me to this topic and the support during this work, who always had time to talk and answer questions, for  ... 
doi:10.34726/hss.2020.72218 fatcat:dl4iyoxbhzbbljfmqhdfp7eufe

Behavioural Sciences and the Regulation of Privacy on the Internet [chapter]

Nudge and the Law : A European Perspective  
For example, many firms have used flash cookies to respawn (re-install) cookies that people deleted.  ...  may be expressed by using the appropriate settings of a browser or other application.' 88 Many marketers suggest that people that do not block tracking cookies in their browser give implied consent to  ... 
doi:10.5040/9781474203463.ch-008 fatcat:5xbh2holvvbixjbgbwilutsuue

Proactive Web Security and Privacy Systems without Breaking Compatibility

Xiang Pan
2017 unpublished
In this these, I will introduce two of my projects CSPAutoGen and TrackingFree. The former protects web security, while the latter works in web privacy.  ...  My thesis focuses on protecting web users' security and privacy using proactive approach.  ...  Last but not least, I thank my parents and my wife for their patience, supports and encouragements. I am who I am because of them. 2.1.  ... 
doi:10.21985/n2668g fatcat:67qtmbe5wfbvbpcz7mshmu5jpq

The impact of losing control over personal information from Big Brother to Big Data

Michaela Jungwirth, Markus Haslinger
2015
My thesis also covers the development of society in conjunction with the enactment of applicable Austrian laws, as well as regulations and directives of the European Union concerning data protection of  ...  Finally, I published my research results in a blog, to open the social development and the current legal situation in a clear and understandable way to the public.  ...  an alarming tracking method provided by Verizon to respawn deleted cookies on mobile devides.  ... 
doi:10.34726/hss.2015.26556 fatcat:6smdi4lcxvchzfi22lirkjhsqi