Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies

被引:0
|
作者
Milligan, Julissa [1 ]
Scheffler, Sarah [1 ]
Sellars, Andrew [1 ]
Tiwari, Trishita [1 ]
Trachtenberg, Ari [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-55958-8_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent developments in online tracking make it harder for individuals to detect and block trackers. This is especially true for device fingerprinting techniques that websites use to identify and track individual devices. Direct trackers - those that directly ask the device for identifying information - can often be blocked with browser configurations or other simple techniques. However, some sites have shifted to indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking known as Canvas fingerprinting causes the browser to render a graphic recording rendering statistics as a unique identifier. Even experts find it challenging to discern some indirect fingerprinting methods. In this work, we aim to observe how indirect device fingerprinting methods are disclosed in privacy policies, and consider whether the disclosures are sufficient to enable website visitors to block the tracking methods. We compare these disclosures to the disclosure of direct fingerprinting methods on the same websites. Our case study analyzes one indirect fingerprinting technique, Canvas fingerprinting. We use an existing automated detector of this fingerprinting technique to conservatively detect its use on Alexa Top 500 websites that cater to United States consumers, and we examine the privacy policies of the resulting 28 websites. Disclosures of indirect fingerprinting vary in specificity. None described the specific methods with enough granularity to know the website used Canvas fingerprinting. Conversely, many sites did provide enough detail about usage of direct fingerprinting methods to allow a website visitor to reliably detect and block those techniques. We conclude that indirect fingerprinting methods are often technically difficult to detect, and are not identified with specificity in legal privacy notices. This makes indirect fingerprinting more difficult to block, and therefore risks disturbing the tentative armistice between individuals and websites currently in place for direct fingerprinting. This paper illustrates differences in fingerprinting approaches, and explains why technologists, technology lawyers, and policymakers need to appreciate the challenges of indirect fingerprinting.
引用
收藏
页码:175 / 186
页数:12
相关论文
共 50 条
  • [1] A Data Purpose Case Study of Privacy Policies
    Bhatia, Jaspreet
    Breaux, Travis D.
    2017 IEEE 25TH INTERNATIONAL REQUIREMENTS ENGINEERING CONFERENCE (RE), 2017, : 394 - 399
  • [2] Model-based Minimum Privacy Disclosure Recommendation for Authorization Policies
    Duan, Li
    Zhang, Yang
    Chen, Shiping
    Liu, Xuan
    Cheng, Bo
    Chen, Junliang
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 403 - 410
  • [3] From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling
    Dimova, Yana
    Kode, Mrunmayee
    Kalantari, Shirin
    Wuyts, Kim
    Joosen, Wouter
    Muhlberg, Jan Tobias
    PROCEEDINGS OF THE 22ND WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2023, 2023, : 17 - 29
  • [4] A case of error disclosure: a communication privacy management analysis
    Petronio, Sandra
    Helft, Paul R.
    Child, Jeffrey T.
    JOURNAL OF PUBLIC HEALTH RESEARCH, 2013, 2 (03) : 175 - 181
  • [5] Privacy Disclosure in the Real World: An Experimental Study
    Wang, Siyu
    Zhu, Nafei
    He, Jingsha
    Teng, Da
    Yang, Yue
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [6] Analyzing IOT users' mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment
    Menard, Philip
    Bott, Gregory J.
    COMPUTERS & SECURITY, 2020, 95
  • [7] An Exploratory Study on the Measuring of Privacy Policies
    Yang, Lianfeng
    Chen, Qiuying
    Hu, Yonhong
    SIXTEENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, 2017, : 338 - 348
  • [8] Privacy antecedents for SNS self-disclosure: The case of Facebook
    Zlatolas, Lili Nemec
    Welzer, Tatjana
    Hericko, Marjan
    Hoelbl, Marko
    COMPUTERS IN HUMAN BEHAVIOR, 2015, 45 : 158 - 167
  • [9] Self-disclosure, Privacy concerns and Social Capital benefits interaction in FB: A case study
    Tzortzaki, Eleni
    Kitsiou, Angeliki
    Sideri, Maria
    Gritzalis, Stefanos
    20TH PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2016), 2016,
  • [10] Analysis of Privacy Leakage Risks in the Context of Security Threats Associated with Digital Device Fingerprinting
    Podsevalov, Ivan
    Podsevalov, Alexei
    Korkhov, Vladimir
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS-ICCSA 2024 WORKSHOPS, PT VII, 2024, 14821 : 386 - 404