145 Top Web Sites Track Users despite “Do Not Track” Restrictions
Nearly 1.5% of the Internet’s top websites track visitors without their knowledge or permission, even when they have explicitly enabled their browser’s “Do Not Track” option, according to new research into the practice known as device fingerprinting. Also called browser fingerprinting, it is a process that collects the screen size, list of available fonts, software versions, and other properties of a visitor’s device to create a nearly-unique profile of that device that can be used to track them across the web.
But the researchers found the websites used device fingerprinting to track visitors even when they explicitly request not to be tracked by enabling the Do Not Track HTTP header, and that few sites informed visitors of the practice.
Not content with purely academic analysis, the researchers developed a tool called FPDetective that analyzes websites for suspicious scripts to help visitors evade device fingerprinting.
Although the researchers followed legal advice in not listing the websites it found using device fingerprinting, researcher Gunes Acar of KU Leuven University in Belgium told Ars Technica that they included orbitz.com, tmobile.co.uk, pokerstrategy.com, anonymizer.com, westernunion.com, and t-online.de.
To Learn More:
FPDetective: Dusting the Web for Fingerprinters (by Gunes Acar, Marc Juarez, et al., KU Leuven) (pdf)
Top Sites (and maybe the NSA) Track Users with “Device Fingerprinting” (by Dan Goodin, Ars Technica)
- Top Stories
- Unusual News
- Where is the Money Going?
- U.S. and the World
- Appointments and Resignations
- Latest News
- Trump at 100 Days: What the Polls Say
- Co-Chair of the Appalachian Regional Commission: Who Is Tom Wolf?
- Vice Chair of the United States-China Economic and Security Review Commission: Who Is Dennis Shea?
- Chair of the State Justice Institute: Who Is Chase Rogers?
- Acting Chair of the U.S. Commission on Civil Rights: Who Is Patricia Timmons-Goodson?