Most Browsers Leave Your History Behind, Study Says
Research conducted by the Electronic Frontier Foundation (EFF) suggests that more than 8 in 10 of web browsers have unique signatures, creating identifiable "fingerprints" that can be used to track almost any user that browses the Internet.
The results (PDF) were found after an experiment was conducted by the EFF with volunteers who visited panopticlick.eff.org. Each participant who visited that site had the configuration and version information of their operating systems, browser, and browser plug-ins anonymously logged. (Source: eff.org)
The information gathered by the website is data which most websites routinely record each time a site is visited. The logged information was compared to a database of configurations collected from almost a million other website visitors.
Study Suggests Configuring Browsers for Anonymity is Difficult
The EFF took measures to keep participants in their experiment anonymous. There are several companies that sell products claiming to use browser fingerprinting to help websites identify users and track their online activities.
The experiment conducted by the Electronic Frontier Foundation reveals just how powerful browser tracking mechanisms are. The EFF found some browsers were less likely to contain unique configurations, including browsers that block JavaScript. Some browser plug-ins may be configurable to limit the information shared with websites visited by the user.
Overall, the study suggest that reconfiguring a browser to make it less identifiable is very difficult.
Browser Fingerprinting a Powerful Technique
Senior Staff Technologist Peter Eckersley of Electronic Frontier Foundation said that "browser fingerprinting is a powerful technique, and fingerprints must be considered alongside cookies and IP addresses when we discuss web privacy and user trackability."
Eckersley hopes that in the future browser developers will work to reduce these privacy risks. The EFF's findings will be formally presented at the Privacy Enhancing Technologies Symposium (PETS 2010) in Berlin this July in 2010.
Visit Bill's Links and More for more great tips, just like this one!
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.