Scientists invent new browser tracking method

Scientists invent new browser tracking method

By default, there is no picture in this Topic

[ad_1]

The new method makes it easier to track browsers and helps circumvent a number of anti-shadowing techniques.

A group of researchers from the Technical University of Graz (Austria) has developed an automated system for creating browser profiles using two new attacks on third-party channels, which provide information about the software and hardware used and more effectively track the browser on the Internet.

The results of the study were presented by specialists under the title “JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits”. According to them, the new method makes it easier to track browsers, helps circumvent a number of anti-snooping techniques, and demonstrates that browser-based browsing extensions “allow more information to leak out than they can disguise.”

Obtaining a browser’s digital fingerprint collects data about the user's browser, such as associated software and hardware, browser type, operating system used, various headers, cookies, extensions, screen resolution, etc. This information can be collected using JavaScript .

The method developed by scientists is quite simple: at the first stage, a browser profile is created based on the list of properties available from JavaScript objects. At the second stage, data from another medium are re-collected (alternative browser or OS). Next, the two profiles are reduced to a single template, which is then used to search for variations. These variations allow you to find out about the environment-related properties in Chrome, Edge, Firefox and the mobile version of Tor, with which you can get an idea of ​​the OS, the processor, the installed plug-ins to ensure privacy and the version of the browser.

The study of scientists once again shows that to ensure complete anonymity on the Web is quite difficult, even in the case of the Tor browser, developed with a view to protecting against surveillance. As explained by experts, implemented in Tor measures to disguise the digital footprint may be ineffective if you take into account the additional data.

.

[ad_2]
Securitylab.ru
Source link

TAGS
Share This