FTC Bars Ad Firm From Snooping Browser History 21
itwbennett writes "Score 1 for online privacy. The Federal Trade Commission and online ad firm Epic Marketplace have reached a settlement that will bar Epic from using browser history sniffing technology. According to the news report, 'The history sniffing allowed Epic to determine whether a consumer had visited more than 54,000 domains, including pages relating to fertility issues, impotence, menopause, incontinence, disability insurance, credit repair, debt relief, and personal bankruptcy. Epic used the tracking to send targeted ads related to several health issues, the FTC said.'"
about:trackers (Score:1)
I've removed Ghostery as a memory hog, and replaced it with about:trackers [mozilla.org]
Re: (Score:1)
Now FTC just needs to break the google/doublecklick tracking bug and the Facebook "like" button.
Not needed. It's your computer which loads the like button. If you don't want it to, by all means, don't have it do that. I don't. Not a single packet to or from facebook has ever crossed my network.
Your request sounds like, "I keep ordering hamburgers from this restaurant, and they're really bad for me! The law should make them stop selling me burgers!" No... if you don't want to eat the burgers, then stop ordering them. They aren't going to force them on you.
Once you get laws involved in things lik
NSA/FBI/CIA - Worse than an ad agency (Score:5, Interesting)
Re:NSA/FBI/CIA - Worse than an ad agency (Score:4, Funny)
In the voice of The Count from Sesame Street:
One! One company prevented from violating your privacy! Ha Ha Ha Ha Ha....
Needs to be both illegal and impossible (Score:2, Informative)
This is great, but we need security at both ends here: prosecution to remove the economic incentive to invade people's privacy, and software security to increase the difficulty of doing so.
Here are two tests for vulnerability to history sniffing attacks, one CSS based and one based on cache timing:
http://www.mikeonads.com/2008/07/13/using-your-browser-url-history-estimate-gender/ [mikeonads.com]
http://lcamtuf.coredump.cx/cachetime/chrome.html [coredump.cx]
Unfortunately it seems Opera (12.11) is still vulnerable to the CSS leak. :(
Re: (Score:3)
Re:Needs to be both illegal and impossible (Score:4, Interesting)
Law of unintended consequences without an easy fix.
For example, browsers have long used vlink highlighting to show previously visited links, which are really handy if users have a tendency to wander. E.g., if you're just browsing Wikipedia, it's awfully nice to know if you've already seen the article it links to ahead of time. Or if it's a list of files, if you've already downloaded it before (perhaps if you're showing someone how to get said file or what file you actually used).
The question becomes though is should scripts be able to get at the DOM properties? Setting it is useful (to highlight new options for example), but getting it? Might be useful for some effects I suppose. And then once gotten, it's really just a simple XmlHttpRequest away from passing that information back to the server.
It's really nothing special other than the clever combination of several innocent features in a nefarious way. (And no one had the gal to patent it... )
Result: (Score:2)
But it's OK for Verizon... (Score:1)
All they would see (Score:2)
Wait, what? (Score:4, Insightful)
Wait, what? A web site can secretly access my browser history? Why does this need the FTC need to get involved, shouldn't "we" stop them by fixing the browsers?
Re: (Score:2)
Don't keep history (Score:1)
THIS is why I always clear the browser history. At least, that is what I tell my wife.