Risk
10/24/2013
11:38 AM
50%
50%

Browser Fingerprinting: 9 Facts

Tracking technology that can identify individual identities and devices is improving faster than consumers might realize, warn privacy researchers.

Not all firms that track consumers' browsing behavior by using advanced browser fingerprinting techniques fail to honor "Do Not Track" (DNT) flags or opt-out preferences.

So said James Brentano, VP of solutions at BlueCava, responding to a recently released study -- "FPDetective: Dusting the Web for Fingerprinters" -- from privacy researchers in Belgium and the United States. The study reported that at least 404 of the world's one million most popular websites were using advanced techniques to fingerprint users and devices and to tie an individual consumer's identity to multiple devices. The researchers warned that latest-generation techniques, based on JavaScript and Flash fingerprinting of devices, aren't technically cookies, and thus might allow advertisers to bypass European cookie laws.

But Brentano said that BlueCava -- whose fingerprinting tracking technology the researchers most often encountered during their survey of the Web -- doesn't fingerprint in a surreptitious manner. "We do respect 'Do Not Track' from all the browsers. We do have opt out," he said, speaking by phone. "There's no value for a company like us in tracking people who don't want to be tracked, because people who don't want to be tracked don't respond to tracking."

[ Is a more secure browser in your future? Read Aviator Browser Blocks Ads, Cookies By Default. ]

Still, few consumers likely know about browser fingerprinting, and as awareness grows, the topic promises to become contentious. Here are nine related facts to understand as this debate unfolds:

1. Multiple Tracking Firms Employ Fingerprinting Techniques.

The researchers behind the FPDetective study reported finding fingerprinting technology from numerous firms, including Bitcoin digital wallet provider CoinBase, geolocation and "online fraud prevention" firm MaxMind, consumer tracking provider Mindshare Technology, as well as services with such names as Analyticsengine, Anonymizer, fingerprint.js, Inside graph and Perferencement. But they wrote that BlueCava's font-probing JavaScript code was the most prevalent, and "the only one of the discovered font-probing scripts that queries different sets of fonts based on the device's operating system: 231 fonts for Microsoft Windows, 167 for Mac OS and 62 for other operating systems."

Brentano said this fingerprinting is designed to identify a given device, but not to surreptitiously track it. "Commercially -- and I don't know what the bad guys are doing -- but there's no intent to bypass a user's preferences," he said. "This isn't about privacy, this is about economics. The goal is to give users choice, which sounds like marketing crap, but it's economically true. There's no value to trying to track a user who objects. Brands are very explicit about this: our customers put the burden on us, make sure users know this is happening, and can opt out."

2. Most Consumers Don't Understand Fingerprinting.

Brentano also said that the browser-fingerprinting techniques -- for example, making a record of the fonts used by a given computer -- are well-known in the advertising and tracking industries. "Everyone in this space pretty much has access to the same information -- you can see the fonts, the user agent," he said. But he noted that browsers will also change over time, meaning that the profile of a given device must evolve. "The secret sauce, if you will, is to be able to take these two profiles and recognize if they're the same [device], because you have to do it in Internet time."

Privacy advocate Jim Brock, however, said via phone that he didn't think these types of fingerprinting techniques have been widely adopted. "I'm glad [BlueCava has] an opt-out program; that's good. I'm glad they have a reset button; that's good. But I do not think it's mainstream ... what they're doing," said Brock, who founded PrivacyChoice in 2009, which was acquired by AVG Technologies in May 2013. Brock currently serves as VP of privacy products at AVG.

Gunes Acar, lead author of the FPDetective paper and Ph.D. student -- researching Web and mobile application privacy -- at the University of Leuven in Belgium, posited that most consumers would be surprised to learn about these fingerprint techniques, which were first discovered by a font geek. "I don't think it's well known, even in academia," Acar said via email. "Most of the people who hear about that -- measuring the sizes of invisible strings with different fonts -- freak out."

3. Billions In Ad Revenue Drive Consumer Tracking.

The economic incentives to track users today are higher than ever. Internet sales figures from the first half of 2013 totaled $20.1 billion -- an all-time high -- which was an increase of 18% from the same period last year.

Still, what's wrong with fingerprinting techniques? "My problem with them is they're immutable, invisible and unexpected by consumers," Brock explained. "These types of methods are on the frontier of aggressive data collection because ... they associate your data and activity across multiple devices, and associate your household's devices in a way that consumers wouldn't expect."

4. Not All Fingerprinting Vendors Are The Same.

As demand for new tracking techniques grows, however, not all JavaScript and Flash-based fingerprinting technology -- or vendors -- are the same. "Let me acknowledge that among the fingerprinting companies we aware of, BlueCava might be the most transparent about their practices," Acar said. "I guess this is partly because they want to operate in Europe and have to comply with the EU directives." These include the eCookie Directive, which was designed to ensure that users were tracked only with their consent.

Legally speaking, fingerprinting technology falls into a gray area. "Since you don't have to store cookies with fingerprinting, user consent is possibly not required," Acar said, though he noted that this has yet to be tested in European court. In addition, he noted that BlueCava's opt-out page doesn't apply to third parties who use its technology, which may include for fraud prevention purposes.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6477
Published: 2014-11-23
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4...

CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?