Proceedings of the 25th International Conference on World Wide Web 2016
DOI: 10.1145/2872427.2883028
|View full text |Cite
|
Sign up to set email alerts
|

Tracking the Trackers

Abstract: Online tracking poses a serious privacy challenge that has drawn significant attention in both academia and industry. Existing approaches for preventing user tracking, based on curated blocklists, suffer from limited coverage and coarsegrained resolution for classification, rely on exceptions that impact sites' functionality and appearance, and require significant manual maintenance. In this paper we propose a novel approach, based on the concepts leveraged from k-Anonymity, in which users collectively identif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
91
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 81 publications
(92 citation statements)
references
References 8 publications
1
91
0
Order By: Relevance
“…The most widely used ad-blocking list is EasyList, and the most widely used tracker-blocking list is EasyPrivacy. Filter list based blocking introduces false positives and false negatives [43], but the popularity of ad blocking suggests that many users find the usability trade-off to be acceptable. While request-blocking extensions are supported primarily by web browsers, some email clients also have support for them, notably Thunderbird.…”
Section: Defensementioning
confidence: 99%
“…The most widely used ad-blocking list is EasyList, and the most widely used tracker-blocking list is EasyPrivacy. Filter list based blocking introduces false positives and false negatives [43], but the popularity of ad blocking suggests that many users find the usability trade-off to be acceptable. While request-blocking extensions are supported primarily by web browsers, some email clients also have support for them, notably Thunderbird.…”
Section: Defensementioning
confidence: 99%
“…78%) have 3rd parties which synchronize cookies with at least one other party, and they can reconstruct 62-73% of a user's browsing history [11]. Furthermore, 95% of pages visited contain 3rd party requests to potential trackers and 78% attempt to transfer unsafe data [46]. Finally, a mechanism for respawing cookies has been identified, with consequences on the reconstruction of users' browsing history, even if they delete their cookies [1].…”
Section: Introductionmentioning
confidence: 99%
“…Yu et al proposed a concept in which users collectively identify unsafe data elements and report them to a central server [113]. In their model, all data elements are considered unsafe when they are first reported.…”
Section: Decreasing the Surface Of Browser Apismentioning
confidence: 99%