General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsOther means of tracking you online
It appears there are other ways of determining who is behind that 'anonymous' blog post. Those more internet tubes-savvy than me can discuss whether these methods are negated or even impacted by SSL, VPN (virtual private networking) or otherwise.
Race Is On to 'Fingerprint' Phones, PCs
He's off to a good start. So far, Mr. Norris's start-up company, BlueCava Inc., has identified 200 million devices. By the end of next year, BlueCava says it expects to have cataloged one billion of the world's estimated 10 billion devices.
Advertisers no longer want to just buy ads. They want to buy access to specific people. So, Mr. Norris is building a "credit bureau for devices" in which every computer or cellphone will have a "reputation" based on its user's online behavior, shopping habits and demographics. He plans to sell this information to advertisers willing to pay top dollar for granular data about people's interests and activities.
EFF: Forget cookies, your browser has fingerprints
The research puts a quantitative assessment on something that security gurus have known about for years, said Peter Eckersley, the EFF senior staff technologist who did the research. He found that configuration information -- data on the type of browser, operating system, plugins, and even fonts installed can be compiled by Web sites to create a unique portrait of most visitors.
This means that most Internet users are a lot less anonymous than they believe, Eckersley said. "Even if you turn off cookies and you use a proxy to hide your IP address, you could still be tracked," he said.
Tracking PCs anywhere on the Net
<>
The technique works by "exploiting small, microscopic deviations in device hardware: clock skews." In practice, Kohno's paper says, his techniques "exploit the fact that most modern TCP stacks implement the TCP timestamps option from RFC 1323 whereby, for performance purposes, each party in a TCP flow includes information about its perception of time in each outgoing packet. A fingerprinter can use the information contained within the TCP headers to estimate a device's clock skew and thereby fingerprint a physical device."
Cooley Hurd
(26,877 posts)Never forget that the "Information Superhighway" is 6-lanes - 3 in and 3 out.
blkmusclmachine
(16,149 posts).
freshwest
(53,661 posts)At least the government has to go to court - these guys, no. Will laws to prevent them be enacted?
I doubt it. The technology has over run our centuries old ideas about privacy in public and in our own homes.
I hate it but it's nothing new, and I don't even believe the best laws will stop it. Because it's about making money from something most people refuse to give up, even after giving enough data to their ISP to set up identity theft.
We are complicit by participating. The chance for abuse has always been there. Biggest fear I have is of a Teabagger presidency to match the ones in the Congress.
They will look for their enemies in their homes, just as they have in public. We can unite and not let them, or walk away and they'll do it since we let them rule us.