[talk] Personalization

Edward Capriolo edlinuxguru at gmail.com
Wed Jul 26 08:39:42 EDT 2017


here are many techniques to fingerprint.

http://spectrum.ieee.org/tech-talk/telecom/internet/new-online-fingerprinting-technique-works-across-browsers

https://www.google.com/amp/s/arstechnica.com/security/2017/02/now-sites-can-fingerprint-you-online-even-when-you-use-multiple-browsers/%3famp=1

For instance, the cross-browser fingerprinting carries out 20 carefully
selected tasks that use the WebGL standard for rendering 3D graphics in
browsers <https://get.webgl.org/>. In all, 36 new features work
independently of a specific browser.

Use webgl to draw shapes. Each pc does it differently, and the result can
be a feature of your system to fingerprint the browser.


On Jul 26, 2017 8:29 AM, "Malcolm Matalka" <mmatalka at gmail.com
<javascript:_e(%7B%7D,'cvml','mmatalka at gmail.com');>> wrote:

>
>
> Den 26 juli 2017 2:02 em skrev "Edward Capriolo" <edlinuxguru at gmail.com
> <javascript:_e(%7B%7D,'cvml','edlinuxguru at gmail.com');>>:
>
> The advertisers never needed cookies. Browsers can be fingerprinted in a
> number of ways. 1) drawing a shape in hardware 2) unique lists of user
> agent, plugins
>
>
> What does drawing a shape in hardware mean?
>
>
> Some companies can match offline data, your phone went to a best buy via
> ip data, access to merchant credit data. Then you go home and that phone
> reconnects to your access point, you use weathe app, app sells data , now
> group the devices in your house to the tx. No cookies needed.
>
> Cookies
>
>
> On Tuesday, July 25, 2017, Brian Cully <bcully at gmail.com
> <javascript:_e(%7B%7D,'cvml','bcully at gmail.com');>> wrote:
>
>>
>> > On 24-Jul-2017, at 17:01, Pete Wright <pete at nomadlogic.org> wrote:
>> >
>> > while cookie data (and to a limited extent - local storage) is used by
>> adtech sites, a majority of the tracking that happens is via 3rd party
>> tracking pixels publishers inject into their websites.  for example if i
>> load www.latimes.com there will be *lots* of calls to 3rd parties which
>> will then obviously collect and analyzie your browsing behavior as you go
>> from page to page and site to site. cookies tend to be used as a
>> placeholder for a UUID associated with whatever device you are using at the
>> time, although for mobile devices that's not even really needed anymore.
>> >
>> > tl;dr just use "privacy mode" in your browser + ublock + ghostery (plus
>> other extensions i'm sure) and you have a decent shot in being semi-private
>> on the commercial internet.
>> >
>>
>>         If you use a Mac as your primary personal machine, I’d highly
>> recommend using Little Snitch, an outbound firewall, as well as your
>> standard suite of ad/tracker blocking. It can be annoying at first as you
>> have to approve/deny a ton of connections, but that settles down after a
>> while. You can also just put it in passive mode and go through it’s logs
>> later to create rules.
>>
>>         I’ve found a lot of things that AdBlock doesn’t catch, and you
>> can use it for any application, which, more and more, have started
>> integrating trackers into themselves.
>>
>> -bjc
>> _______________________________________________
>> talk mailing list
>> talk at lists.nycbug.org
>> http://lists.nycbug.org/mailman/listinfo/talk
>
>
>
> --
> Sorry this was sent from mobile. Will do less grammar and spell check than
> usual.
>
> _______________________________________________
> talk mailing list
> talk at lists.nycbug.org
> <javascript:_e(%7B%7D,'cvml','talk at lists.nycbug.org');>
> http://lists.nycbug.org/mailman/listinfo/talk
>
>
>

-- 
Sorry this was sent from mobile. Will do less grammar and spell check than
usual.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.nycbug.org/pipermail/talk/attachments/20170726/3dc0d811/attachment-0001.html>


More information about the talk mailing list