Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies

被引:0
|
作者
Milligan, Julissa [1 ]
Scheffler, Sarah [1 ]
Sellars, Andrew [1 ]
Tiwari, Trishita [1 ]
Trachtenberg, Ari [1 ]
Varia, Mayank [1 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-030-55958-8_10
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent developments in online tracking make it harder for individuals to detect and block trackers. This is especially true for device fingerprinting techniques that websites use to identify and track individual devices. Direct trackers - those that directly ask the device for identifying information - can often be blocked with browser configurations or other simple techniques. However, some sites have shifted to indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking known as Canvas fingerprinting causes the browser to render a graphic recording rendering statistics as a unique identifier. Even experts find it challenging to discern some indirect fingerprinting methods. In this work, we aim to observe how indirect device fingerprinting methods are disclosed in privacy policies, and consider whether the disclosures are sufficient to enable website visitors to block the tracking methods. We compare these disclosures to the disclosure of direct fingerprinting methods on the same websites. Our case study analyzes one indirect fingerprinting technique, Canvas fingerprinting. We use an existing automated detector of this fingerprinting technique to conservatively detect its use on Alexa Top 500 websites that cater to United States consumers, and we examine the privacy policies of the resulting 28 websites. Disclosures of indirect fingerprinting vary in specificity. None described the specific methods with enough granularity to know the website used Canvas fingerprinting. Conversely, many sites did provide enough detail about usage of direct fingerprinting methods to allow a website visitor to reliably detect and block those techniques. We conclude that indirect fingerprinting methods are often technically difficult to detect, and are not identified with specificity in legal privacy notices. This makes indirect fingerprinting more difficult to block, and therefore risks disturbing the tentative armistice between individuals and websites currently in place for direct fingerprinting. This paper illustrates differences in fingerprinting approaches, and explains why technologists, technology lawyers, and policymakers need to appreciate the challenges of indirect fingerprinting.
引用
收藏
页码:175 / 186
页数:12
相关论文
共 50 条
  • [41] DISCLOSURE OF PENSION LIABILITY - A CASE-STUDY
    HENRY, EJ
    JOURNAL OF ACCOUNTANCY, 1982, 153 (05): : 107 - 108
  • [42] Towards conflicts prevention among privacy policies: A comparative study of major privacy laws and regulations for healthcare
    Sadki, Souad
    El Bakkali, Hanan
    Akhattab, Mohammed
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 286 - 292
  • [43] Cloud privacy: an empirical study of 20 cloud providers' terms and privacy policies-Part II
    Kamarinou, Dimitra
    Millard, Christopher
    Hon, W. Kuan
    INTERNATIONAL DATA PRIVACY LAW, 2016, 6 (03) : 170 - 194
  • [44] Cloud privacy: an empirical study of 20 cloud providers' terms and privacy policies-Part I
    Kamarinou, Dimitra
    Millard, Christopher
    Hon, W. Kuan
    INTERNATIONAL DATA PRIVACY LAW, 2016, 6 (02) : 79 - 101
  • [45] CompLicy: Evaluating the GDPR Alignment of Privacy Policies - A Study on Web Platforms
    Vanezi, Evangelia
    Zampa, George
    Mettouris, Christos
    Yeratziotis, Alexandros
    Papadopoulos, George A.
    RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS 2021), 2021, 415 : 152 - 168
  • [46] Smart Home Privacy Policies Demystified: A Study of Availability, Content, and Coverage
    Manandhar, Sunil
    Kafle, Kaushal
    Andow, Benjamin
    Singh, Kapil
    Nadkarni, Adwait
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3521 - 3538
  • [47] A BERT-based Empirical Study of Privacy Policies' Compliance with GDPR
    Zhang, Lu
    Moukafih, Nabil
    Alamri, Hamad
    Epiphaniou, Gregory
    Maple, Carsten
    2023 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY, CNS, 2023,
  • [48] Evaluation Study on Privacy Policies of Express Companies Based on Cloud Model
    Zhang, Qian
    Xie, Weihong
    Pan, Xinxian
    2022 6TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY, CSP 2022, 2022, : 21 - 26
  • [49] An empirical study of consumer perceptions and comprehension of web site privacy policies
    Vail, Matthew W.
    Earp, Julia B.
    Anton, Annie I.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2008, 55 (03) : 442 - 454
  • [50] Impact of "environmental disclosure greenwashing": a study from the perspective of heterogeneous environmental policies
    Zhou, Yiqiang
    Chen, Lianghua
    Peng, Xue
    Li, Wan
    ENVIRONMENT DEVELOPMENT AND SUSTAINABILITY, 2024,