Re: [Model-t] Web Tracking

"Dirk Kutscher" <ietf@dkutscher.net> Mon, 17 February 2020 18:46 UTC

Return-Path: <ietf@dkutscher.net>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD7A3120860 for <model-t@ietfa.amsl.com>; Mon, 17 Feb 2020 10:46:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id n81idap0gqY3 for <model-t@ietfa.amsl.com>; Mon, 17 Feb 2020 10:46:16 -0800 (PST)
Received: from mout.kundenserver.de (mout.kundenserver.de [217.72.192.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB73112012C for <model-t@iab.org>; Mon, 17 Feb 2020 10:46:15 -0800 (PST)
Received: from [192.168.1.69] ([77.21.26.148]) by mrelayeu.kundenserver.de (mreue109 [212.227.15.183]) with ESMTPSA (Nemesis) id 1Myb8N-1jOhTA3IRZ-00yyZG; Mon, 17 Feb 2020 19:46:09 +0100
From: Dirk Kutscher <ietf@dkutscher.net>
To: Eric Rescorla <ekr@rtfm.com>
Cc: model-t@iab.org
Date: Mon, 17 Feb 2020 19:46:08 +0100
X-Mailer: MailMate (1.13.1r5671)
Message-ID: <58B785BF-BBC5-457F-98C7-361A0210E7A1@dkutscher.net>
In-Reply-To: <CABcZeBN-HNe-j2japnCT5HR49__mxR7jiFAJ4NO27CdpuvirXw@mail.gmail.com>
References: <CABcZeBN-HNe-j2japnCT5HR49__mxR7jiFAJ4NO27CdpuvirXw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="=_MailMate_0BD23BEA-D489-4187-AADC-2DADBAE0BF24_="
Content-Transfer-Encoding: 8bit
Embedded-HTML: [{"HTML":[412, 4145], "plain":[81, 3838], "uuid":"A3545DA5-63F3-4595-AE89-18737A1C7505"}]
X-Provags-ID: V03:K1:fDOE5ZCqhM6GV/aDJcd3KfVhMqFeNbdJATHqrdakGK+QpZ8sptr vvLsmIJgVaE5NJ3DMTiK9YRMD1XLys+1g7QE6jpsfdtw4z5gJBB5veK9eECs2FJVE9Xnan5 SMbocDrAJMp9ZIPdqwv8WBHEVtk0mRn3tRYAOlBXX/bt9nY+VZ5yXvK0b/5iglycEQA+tqo h5CKvPr2fQysy2dSRfkJA==
X-UI-Out-Filterresults: notjunk:1;V03:K0:YnbBTWbHHgY=:sUjfofWQfke2itqt6T1MZn SOzWM9nrCgHY/ltC3/2KX4fOAq1acKpJZTqGo1F5HC8Gry2RPKRynjiEEcjHroq5vjpTwl3sM dfv0qF2QRrqO2aGViWDKLs6uLBT8DatdqOv7Yjyc4UUPIns1IpuCl73ukXmb68MpKAYQw3Qlc rsM3HSOCBhZeyQFMwcmAm0oJhYZzpE2PjDcK3MAcCTPJsvuS7WJXRwChv7MT/gPYBErpN1gRz 1vyMebqNJenfEGNjiCCyLKUFCjoCSZoP3iSh4GyBCPEAIFOD+Behg6T7hB38LD9ql4HCmRgsZ PF9zUFiLRKufE7eGpR16fdTHMg5hQVxLlaA+vtyWj5GkffZIclQl6D7/SrOv9peBJLdzBRlRQ 01n57ZcdwHMd3NHCpkEMjUJI0pblmBVMzu2EkytK0zEUwX8d+qF8XAdunRqS9zuQDmChihH+v j4uAVgGfS6uRem87wWr15XtUPPCxPmMPxfvIa63uzjbnoElPvU4jTIGrdNiNhF5AXfADA7xrD DWyR7bv/+tcG7ivEyF1/rEKC49lH+qxyOaPYVb7pxpp6c4ZZRLWgPG6QhzQupNURXRrbgdLbQ PTWApqGVUB/25U+ql3tY8/q0QVNqlNijxTRCUnB+o439jOVRTBbSKszX143bFtr5P311bLVLB GDSmp5UXUlInetnKQyu7mYnXgF6pl/QX9vR6qV9p1flreArdVk7xhJutEyQl725U5XbpMEyvh LIwQ2yIoUiLrnu4G6n3cYqyDBR+YIstFHr9DA3od9m2GzZHgATwjgMsjFyeoukXDYwlmN+HgJ vPKthu+qD0VGq8/OVQQHh197t4xBhmDHdjaSfFXe0JsawhgtT7S8u8A+Z1U1MSpULU44eet
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/PVmsYT2cp-AZciD9CA-Nbq3qTzs>
Subject: Re: [Model-t] Web Tracking
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Feb 2020 18:46:24 -0000

Thanks — very useful!

Dirk

On 17 Feb 2020, at 18:31, Eric Rescorla wrote:

> And here is our text on Web Tracking
>
> One of the biggest threats to user privacy on the Web is ubiquitous
> third party tracking. This takes advantage of HTTP Cookies [RFC6265]
> in what is called a "third party context". The basic idea here is that
> whenever a resource is loaded from a server, that server can include a
> cookie which will be sent back to the server on future loads. This
> includes situations where the resource is loaded as a "subresource" on
> a page (e.g., an image, a piece of JavaScript, etc.). In addition,
> those loads include a Referer header which contains the top-level page
> that the subresource is being loaded from.
>
> The combination of these features makes it fairly straightforward to
> build a system which tracks the user across the Web. The way this
> works is that the tracker convinces a number of content sites ("first
> parties") to include a subresource from the tracker site.  Sometimes
> this subresource also performs some other function such as displaying
> an ad or providing analytics to the first party site, but sometimes it
> is simply a tracker. Then, whenever the user visits one of those
> content sites, the tracker receives the pair of (1) the Referer header
> and (2) the cookie, which is the same for each browser client
> regardless of which site the tracker is on. Together these allow the
> tracker to build up a picture of the user's browsing history. This
> can then be used for various purposes, but is most commonly used
> for ad targeting.
>
> This capability itself constitutes a major threat to user privacy.
> However, there are a number of practices which increase the threat:
>
> * Cookie Syncing: any given tracker may not be on all sites,
>   which gives the tracker incomplete coverage. However, trackers
>   often collude (a practice called "cookie syncing") to bridge
>   different tracking cookies.
>
> * Identifier correlation: sometimes trackers will be embedded
>   on a site which collects a user identifier (e.g., an e-mail
>   address), in which case the site can inform the tracker of the
>   address which allows the tracker to tie it to the cookie.
>
> * Fingerprinting: Cookies are a form of explicit state, which allows
>   browsers to blook or erase them. However, it is also possible to use
>   characteristics of the browser to track the user.  For instance,
>   features such as User-Agent string, plugin and font support, screen
>   resolution, and timezone can yield a fingerprint that is sometimes
>   unique to a single user [0] and which persists beyond cookie
>   deletion. Even in cases where this fingerprint is not unique, the
>   anonymity set may be sufficiently small that, when coupled with yet
>   more data, yields a unique, per-user identifier. Fingerprinting of
>   this type is more prevalent on systems and platforms wherein data
>   set features are flexible, such as desktops, wherein plugins are
>   more commonly in use.  Fingerprinting prevention is an active
>   research area; see [1] for more information.
>
>
> A number of browsers have started adding anti-tracking technologies.
> This is a rapidly moving field and so it is difficult to characterize
> here, but there are several basic ideas:
>
> * Blocking any communication with known trackers
> * Identifying trackers and suppressing their ability to store
>   and access cookies and other state.
> * "Double keying" in which each third party load on different
>   first party sites is treated as a different context, thereby
>   isolating cookies and other state, e.g., TLS-layer information.
>
>
>
> [0] Gómez-Boix, Alejandro, Pierre Laperdrix, and Benoit Baudry. "Hiding in
> the crowd: an analysis of the effectiveness of browser fingerprinting at
> large scale." Proceedings of the 2018 world wide web conference. 2018.
> [1] https://amiunique.org


> -- 
> Model-t mailing list
> Model-t@iab.org
> https://www.iab.org/mailman/listinfo/model-t