ABSTRACT
For the last few years we have been studying the diffusion of private information for users as they visit various Web sites triggering data gathering aggregation by third parties. This paper reports on our longitudinal study consisting of multiple snapshots of our examination of such diffusion over four years. We examine the various technical ways by which third-party aggregators acquire data and the depth of user-related information acquired. We study techniques for protecting privacy diffusion as well as limitations of such techniques. We introduce the concept of secondary privacy damage. Our results show increasing aggregation of user-related data by a steadily decreasing number of entities. A handful of companies are able to track users' movement across almost all of the popular Web sites. Virtually all the protection techniques have significant limitations highlighting the seriousness of the problem and the need for alternate solutions.
- Adblock plus: Save your time and traffic. http://adblockplus.org/Google Scholar
- C. Albanesius. Microsoft tips {IE8} privacy features, August 26 2008. http://www.pcmag.com/article2/0,2817,2328900,00.aspGoogle Scholar
- Alexa: Most popular web sites. http://www.alexa.com/Google Scholar
- Cuil -- your privacy. http://www.cuil.com/privacy/Google Scholar
- W. Davis. Polish on google's new chrome tarnished by privacy questions, September 2, 2008. http://www.mediapost.com/publications/index.cfm?fa=Articles.showArticle&art_aid$Google Scholar
- S. DeDeo. Pagestats, May 2006. http://www.cs.wpi.edu/cew/pagestats/Google Scholar
- European union directive 95/46/{EC}. http://www.cdt.org/privacy/eudirective/EU_Directive.html, 1995.Google Scholar
- A. Greenberg. Going 'incongnito' can you really web browse on the down low?, September 5, 2008. http://www.newsweek.com/id/157293?tid=relatedclGoogle Scholar
- I'm A Super.Com. Flash cookies: The silent privacy killer, October 9 2008. http://www.imasuper.com/66/technology/flash-cookies-the-silent-privacy-killer/Google Scholar
- C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell. Protecting browser state from web privacy attacks. In Proceedings of the International World Wide Web Conference, Edinburgh, Scotland, May 2006. Google ScholarDigital Library
- B. Krishnamurthy, D. Malandrino, and C. E. Wills. Measuring privacy loss and the impact of privacy protection in web browsing. In Proceedings of the Symposium on Usable Privacy and Security, pages 52--63, Pittsburgh, PA USA, July 2007. Google ScholarDigital Library
- B. Krishnamurthy and C. Wills. Cat and mouse: Content delivery tradeoffs in web access. In Proceedings of the International World Wide Web Conference, Edinburgh, Scotland, May 2006. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. Generating a privacy footprint on the {Internet}. In Proceedings of IMC, October 2006. Google ScholarDigital Library
- B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In Proceedings of the Workshop on Online Social Networks, pages 37--42, Seattle, WA USA, August 2008. ACM. Google ScholarDigital Library
- Michael Afergan and Thomson Leighton and Timothy Johnson and Brian Mancuso and Ken Iwamoto. Method of data collection among participating content providers in a distributed network, 2008. United States Patent Application 20080092058. http://www.freepatentsonline.com/y2008/0092058.htmlGoogle Scholar
- Mike On Ads. How do behavioral networks work?, February 28 2007. http://www.mikeonads.com/2007/02/28/how-do-behavioral-networks-work/Google Scholar
- Noscript. https://addons.mozilla.org/firefox/722/Google Scholar
- S. Olsen and T. Krazit. Dell embraces google, May 25, 2006. http://news.cnet.com/Dell-embraces-Google/2100-1032_3-6077051.htmlGoogle Scholar
- Pests clasified in the category tracking cookie. http://www.pestpatrol.com/zks/pestinfo/tracking_cookie.aspGoogle Scholar
- Privacy on the web: Is it a losing battle?, June 25, 2008. Published in Knowledge@Wharton. http://knowledge.wharton.upenn.edu/article.cfm?articleid=1999Google Scholar
- P. Whoriskey. Candidates' web sites get to know the voters presidential campaigns tailor, target ads based on visitors' online habits, August 30 2008. http://www.washingtonpost.com/wp-dyn/content/article/2008/08/29/AR2008082903178Google Scholar
- Consumer tips: How to opt-out of cookies that track you. http://www.worldprivacyforum.org/cookieoptout.htmlGoogle Scholar
Index Terms
- Privacy diffusion on the web: a longitudinal perspective
Recommendations
Sensible Privacy: How We Can Protect Domestic Violence Survivors Without Facilitating Misuse
WPES '14: Proceedings of the 13th Workshop on Privacy in the Electronic SocietyPrivacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and ...
Measuring privacy loss and the impact of privacy protection in web browsing
SOUPS '07: Proceedings of the 3rd symposium on Usable privacy and securityVarious bits of information about users accessing Web sites. some of which are private, have been gathered since the inception of the Web. Increasingly the gathering, aggregation, and processing has been outsourced to third parties. The goal of this ...
On Being an Expert: Habitus as a Lens for Understanding Privacy Expertise
CSCWHow do privacy experts and lay persons differ? We investigate this question using data about the use of privacy-enhancing technologies and strategies from 128 surveys and 17 follow-up interviews with two populations: privacy experts (i.e., privacy ...
Comments