Evaluation of third party tracking on the web

In this paper our goal is to measure the presence of trackers and tracking components in websites to identify their dangerousness to privacy.We propose an intuitive privacy scoring model to quantify the use of tracking techniques and identify how users activities are tracked when they are online. We developeded and distributed a firefox add-on that collects the web browsing history of our volunteers along with the detected tracking components and computes the scores of the visited web page. Using our collected dataset, we examine the tracking capabilities in the wild. Our findings show that while cookies-based tracking is present in almost all websites, independently from the content and from the audience, JavaScripts are also present and can also be a major vector of web tracking. We demonstrate that the trackers dangerousness for the user's privacy should not be measured by the number of components but by their presence through the websites and the domains. Correlation was also found between scores and tracking components which confirms that our intuitive scoring model is realistic.

[1]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[2]  Claude Castelluccia,et al.  Data Harvesting 2.0: from the Visible to the Invisible Web , 2013, WEIS 2013.

[3]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[4]  Bittersweet cookies. Some security and privacy considerations , 2011 .

[5]  David Wetherall,et al.  Detecting and Defending Against Third-Party Tracking on the Web , 2012, NSDI.

[6]  Chris Jay Hoofnagle,et al.  Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.

[7]  Balachander Krishnamurthy,et al.  WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Privacy Diffusion on the Web: A Longitudinal Perspective , 2022 .

[8]  Li Bai,et al.  A strong ramp secret sharing scheme using matrix projection , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[9]  Sorin Lerner,et al.  An empirical study of privacy-violating information flows in JavaScript web applications , 2010, CCS '10.

[10]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[11]  Weiping Wang,et al.  New Public-Key Cryptosystem Based on Two-Dimension DLP , 2012, J. Comput..

[12]  User Privacy and the Evolution of Third-Party Tracking Mechanisms on the World Wide Web , 2010 .

[13]  Lorrie Faith Cranor,et al.  A Survey of the Use of Adobe Flash Local Shared Objects to Respawn HTTP Cookies , 2011 .

[14]  Ivan Niven Fermat’s theorem for matrices , 1948 .