[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y ] [Home]
4chanarchives logo
Fingerprint Thread
Images are sometimes not shown due to bandwidth/network limitations. Refreshing the page usually helps.

You are currently reading a thread in /g/ - Technology

Thread replies: 30
Thread images: 2
File: 1366809257793.jpg (85 KB, 303x438) Image search: [Google]
1366809257793.jpg
85 KB, 303x438
Previous thread: >>55447840
http://browserprint.info/
http://panopticlick.eff.org/
http://ip-check.info
http://browserleaks.com/

Fingerprinting is a new way of tracking you across websites.
It's being done right now by companies like Google.
Because unlike cookie based tracking you can't defeat it just by disabling cookies.
There is currently NO FOOLPROOF DEFENCE against fingerprinting (except quitting the Internet).

Google's privacy policy states
>Other technologies are used for similar purposes as a cookie on other platforms where cookies are not available or applicable
https://www.google.com/intl/en/policies/privacy/key-terms/#toc-terms-cookie

ReCAPTCHA probably contains fingerprinting code:
https://archive.is/9K5gs
This means that the majority of 4chan users could be being fingerprinted, and Google might know about your shitposting habits even if cookies are disabled.

Google releases limited hangout of how much they know about you:
https://news.slashdot.org/story/16/06/29/2038257/googles-my-activity-reveals-how-much-it-knows-about-you
>Oh, they're just remembering what YouTube videos I watched, nothing creepy about that, I already knew they were doing it!
>I guess all those people who fear tracking really are just conspiracy theorists!

Daily reminder to do all your Amazon / eBay / LinkedIn / botnet shit in a completely separate browser to your Googling or buying shit.
It's currently the ONLY way to truly defend against fingerprint tracking.
Double points if you have each browser running in a different VM with a different OS.
Triple points if you have each browser's VM configured with a different VPN connection.
>>
I probably spend more time ragging on the TBB than it deserves.
It makes a good effort at protecting against fingerprinting, it's just the wrong approach.
Spoofing a different fingerprint for each site you visit is potentially a much more powerful approach
>>
I've had the same IP address forever, why should I care.
>>
>>55464729
IP address probably has some use for tracking, but it would be foolish to think all traffic that comes from one IP address is linked.
Most people have dynamic IPs which would mean their browsing habits would get linked to random strangers'.
And schools, businesses, and homes tend to have one IP that is shared by many.
>>
>>55464803
>IP address probably has some use for tracking, but it would be foolish to think all traffic that comes from one IP address is linked.
Very true.
More than once 4chan has banned the IP of my ISP's cache server. 'Twasn't me!
>>
I'd like to analyse Google's JavaScript but they did that obnoxious obfuscation thing all web devs seem to do to their scripts
>>
>new
>>
>>55466708
Well it may have been invented a while ago, but it hasn't quite caught on.
>>
>>55464457
How can I set up DNSCrypt in Ubuntu?
>>
>>55466776
How's this fingerprinting?
>>
>>55466776
there should be a dnscrypt-proxy package that you configure according to the install notes. protip: it's slower so you can also use a caching resolver like unbound for 0ms subsequent lookups (point it at dnscrypt e.g on 127.0.0.1:40)
>>
>>55466776
>>55467159
some dnscrypt servers also support dnssec validation which is 1 line uncommented in the unbound config

>>55466978
who cares? most fingerprinting is done by ad networks and you have host-based blocking right? the trouble is the googles and facebooks such as yandex

>>55466646
google closure compiler optimizes javascripts by minimizing the logic of the operations. 1337
>>
>>55455003
>>55455003
>like looking at your IP and user-agent.
And CSS resource requests and unique HTTP e-tags. Don't forget to mention the most powerful, least easy to thwart exploits.
>>
>>55455668
They do it too. And there are bots for them, so they don't even work.
>>
>>55467235
>unique HTTP e-tags
Whut?
Is this a new attack I've never heard of?
>>
>>55458844
>why cant this whole mechanism be fooled by receiving mutiple, random, opposite data, so the real pattern would be lost among flood?
Because no one has developed an extension to do so. Two were started, and mysteriously dropped, Chameleon and FoxGloves. It is a legitimate conspiracy.
>>
>>55464535
It's also pretty easy to defeat. You detect when someone's data is randomized, and cause the site to silently never load or display a misleading error message about ad-blockers. Then you limit access to your servers to people who's data you can sell.
>>
>>55466759
It has very much caught on. Several tracking companies are known to do it. We just don't have any effective tools to deal with it. Not even for a laugh. You can't not be fingerprinted if you use a browser to view any popular website.
>>
>>55467300
How would you detect when someone's data is randomised if they used the same fingerprint for their entire session?
You don't randomise per request, you randomise per domain
>>
>>55467324
Source?
According to a recent, highly publicized paper [1] canvas fingerprinting was only done on like 5% of the top Alexa 1 million websites.
Whereas tracking in general (which I guess means cookies) was pretty much ubiquitous.

[1] Online tracking: A 1-million-site measurement and analysis
>>
>>55467261
There's nothing keeping a server from using unique e-tag identifiers for every single HTTP request. If you load another page in the same tracking network, chances are your browser will have been conned into presenting this identifier to the server again to verify if the cached copy of some file, like a tracking pixel or script file, is still valid. Without aggressively keeping no cached resources, or using some separate caching mechanism that checks for file modification time instead, it's an easy sneaky cookie.
>>
>>55467329
>you randomise per domain
Too easy to defeat. Google, for instance, has code running on thousands of domains. If that code found a different fingerprint from your IP on youtube than gmail, for instance, it could stop working on you to make you submit to the botnet. Samae problem if you randomize by document with IFRAMEs and such. Random fingerprints should vary by tab instead, with a notion of child tabs gaining the same random values as it's parent to deal with stuff like the report function on 4chan, which uses new tabs and recaptcha.
>>
>>55464803
>implying they don't packet sniff 24/7
Even if you encrypt, vpn and proxy you can still be traced.
>>
>>55467381
E-tags... thanks, I learned something new.
Never heard of this before.
I'll look into it
>>
>>55467378
>canvas fingerprinting
That is one exploit that is already addressed by several extensions.
>Source?
This data is 2 years old. It's probably much worse now.
https://web.archive.org/web/20160113141125/https://securehomes.esat.kuleuven.be/~gacar/sticky/index.html
>>
>>55467469
I don't see how that's relevant to the discussion at all.
>>
>>55467539
Thanks
>>
File: finger-drawn.1187245207566.jpg (37 KB, 567x797) Image search: [Google]
finger-drawn.1187245207566.jpg
37 KB, 567x797
I suggest the middle finger as the official emblem of this privacy epidemic.
>>
>>55468757
Not exactly the most professional emblem
>>
A link that should probably be added to OP
http://browserspy.dk/
Thread replies: 30
Thread images: 2

banner
banner
[Boards: 3 / a / aco / adv / an / asp / b / biz / c / cgl / ck / cm / co / d / diy / e / fa / fit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mu / n / news / o / out / p / po / pol / qa / r / r9k / s / s4s / sci / soc / sp / t / tg / toy / trash / trv / tv / u / v / vg / vp / vr / w / wg / wsg / wsr / x / y] [Home]

All trademarks and copyrights on this page are owned by their respective parties. Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
If a post contains personal/copyrighted/illegal content you can contact me at [email protected] with that post and thread number and it will be removed as soon as possible.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com, send takedown notices to them.
This is a 4chan archive - all of the content originated from them. If you need IP information for a Poster - you need to contact them. This website shows only archived content.