Web browser extensions could be used as a means of identifying users and tracking them across the web, new research suggests.
Online tracking has been the bane of the internet from the earliest days, but over the last few years people have become increasingly unwilling to put up with invasions of privacy. While some people claim tracking is necessary to provide personalized ads, and thus keep internet services free, others shiver at the thought of companies keeping tabs on what they do online.
Ever since Google announced it would be killing third-party cookies, stakeholders have been looking for viable alternatives. âFingerprintingâ people based on the various characteristics of the device they use emerged as one of the options. Those characteristics include factors like display resolution, fonts, GPU performance, installed apps and more.
https://cdn.mos.cms.futurecdn.net/ybbmQ8p4Q999AkMWkW8HLm.jpg
Share your thoughts on Cybersecurity and get a free copy of the Hackerâs Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/ÂŁ10.99.
[HEADING=1]Scanning for extensions[/HEADING]
Now, another unique feature can be added to the mix, and thatâs the extensions people have installed on their browsers.
As per a BleepingComputer report, a web developer going by the alias âz0cccâ built a fingerprinting site called âExtension Fingerprintsâ that does just that: fingerprints people based on their Google Chrome extensions.
Some extensions require the use of a secret token to access a web resource as a contingency measure, the researcher says, but there are still methods to learn if an extension is installed on the endpoint or not.
Read more
âResources of protected extensions will take longer to fetch than resources of extensions that are not installed. By comparing the timing differences you can accurately determine if the protected extensions are installed,â z0ccc wrote.
The website scans the visitorâs browser for the existence of 1,170 most popular extensions available in the Google Chrome Web Store. While the method works on Edge (albeit with a few tweaks), it doesnât work on Firefox users.
âThis is definitely a viable option for fingerprinting users,â z0ccc told BleepingComputer. âEspecially using the âfetching web accessible resourcesâ method. If this is combined with other user data (like user agents, timezones etc.) users could be very easily identified.â
Via BleepingComputer
Continue readingâŚ
Online tracking has been the bane of the internet from the earliest days, but over the last few years people have become increasingly unwilling to put up with invasions of privacy. While some people claim tracking is necessary to provide personalized ads, and thus keep internet services free, others shiver at the thought of companies keeping tabs on what they do online.
Ever since Google announced it would be killing third-party cookies, stakeholders have been looking for viable alternatives. âFingerprintingâ people based on the various characteristics of the device they use emerged as one of the options. Those characteristics include factors like display resolution, fonts, GPU performance, installed apps and more.
https://cdn.mos.cms.futurecdn.net/ybbmQ8p4Q999AkMWkW8HLm.jpg
Share your thoughts on Cybersecurity and get a free copy of the Hackerâs Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/ÂŁ10.99.
[HEADING=1]Scanning for extensions[/HEADING]
Now, another unique feature can be added to the mix, and thatâs the extensions people have installed on their browsers.
As per a BleepingComputer report, a web developer going by the alias âz0cccâ built a fingerprinting site called âExtension Fingerprintsâ that does just that: fingerprints people based on their Google Chrome extensions.
Some extensions require the use of a secret token to access a web resource as a contingency measure, the researcher says, but there are still methods to learn if an extension is installed on the endpoint or not.
Read more
Google is charging ahead with its plan to replace cookies
Hereâs how to avoid unwanted tracking online
Over half of Americans now worry cybercriminals are tracking them online
Hereâs how to avoid unwanted tracking online
Over half of Americans now worry cybercriminals are tracking them online
The website scans the visitorâs browser for the existence of 1,170 most popular extensions available in the Google Chrome Web Store. While the method works on Edge (albeit with a few tweaks), it doesnât work on Firefox users.
âThis is definitely a viable option for fingerprinting users,â z0ccc told BleepingComputer. âEspecially using the âfetching web accessible resourcesâ method. If this is combined with other user data (like user agents, timezones etc.) users could be very easily identified.â
Via BleepingComputer
Continue readingâŚ