SHARE

Recent researchers have for the first time developed a reliable technique for the site can track and identify the visitor even if they use more than one browser. This runs counter to the way that the site currently used to identify the visitor, through a digital fingerprint (digital fingerprint) which browser they leave each visit.

This advanced technique proved quite effective in identifying users when they use the browser with default settings or settings that are used frequently. For example, the security tools of the Electronic Frontier Foundation, also known as Panopticlick, found that only 1 in about 77 691 have the same browser setup parameters similar to the person who wrote the browser. These “fingerprints” are the result of the custom settings as well as in the browser settings, including plugins, as well as time zone options like not track “do not track” has been switched on or the use adblocker.

 

But so far, the identification is still limited to a browser. This restriction makes it unable to contact the “fingerprints” of Chrome or Firefox with Edge seal is installed on the same machine. The new technique, described in a research paper titled “Function identification (inter) browser-level operating systems and hardware” is capable of inter-connected activities, as well as major browsers more specifically identifiable style browser application as before.

Basically, the identity is not bad, in some cases also bring benefits to the end user. For example, banks can use it to recognize your customers are accessing their online account on a computer that they have never used before. With the information collected, the bank could immediately confirm the account holder over the phone to ensure turn this sign is allowed. However, more harm, advanced recognition this brings a lot of concerns about privacy.

cross-browser-system-architecture-800x439-1487180640729

“From the perspective is somewhat negative, we can see many people will take advantage of inter-recognition capabilities to make the browser has been customized ads, meaning that infringe the privacy of the recipients of advertising . “Yinzhi Cao, professor and head of research at the Faculty of Science and computer application sharing Lehigh university. “Our work can make the situation worse by changing the user after the browser, the advertising company is still able to recognize the user. To protect against infringement of privacy, we believe our task is to know the enemy knows us. ”

This new technique is based on the browser command line instructions perform some tasks. These actions will in turn use the hardware resources and operating system including graphics cards, with the CPU, sound card as well as the fonts already installed. For example, the identity associated browser will perform 20 tasks using WebGL standard for 3D rendering across browsers. In total there will be 36 new feature works with every browser action setting.

This new identification technique based on the JavaScript command line light enough to be completed quickly in the background when users are busy reading text or watching videos. The researchers also launch site technical demonstration http://www.uniquemachine.org/ to this release and related source code. In a 3615 test collection “fingerprint” from 1903 users in 3 months, this technique was able to accurately identify up to 99.2% of users. Meanwhile, the technical identification of AmIUnique browser application success rate is only 90.8% is.

Fortunately the identification techniques associated this browser does not work with people who use Tor browser in the default settings. Of course, many people still can edit the settings of Tor so that it can support WebGL graphics tasks such as gaming sites or other online addresses. Whatever help consolidate the Tor user experience, this action will also make you less “immune” to the identification techniques. Cao also said that he is yet to see any web page using identification techniques associated browsers.

Identification associated browser is simply a technique that the latest game developers can create to track who accessed their site. In addition to identifying the browser menu, but plenty of other tracking methods as noted how users type in passwords and text as well as audio embed hidden on the ads on TV or the web. Using Tor browser and interrupt the speaker and mic protection probably the most effective privacy though the researchers confirmed that the browser running on the virtual machine has the same effect.

NO COMMENTS

LEAVE A REPLY