72% of 'Anonymous' Browsing History Can Be Attached To the Real User (thestack.com) 67
An anonymous reader quotes a report from The Stack: Researchers at Stanford and Princeton have succeeded in identifying 70% of web users by comparing their web-browsing history to publicly available information on social networks. The study "De-anonymizing Web Browsing Data with Social Networks" [PDF] found that it was possible to reattach identities to 374 sets of apparently anonymous browsing histories simply by following the connections between links shared on Twitter feeds and the likelihood that a user would favor personal recommendations over abstract web browsing. The test subjects were provided with a Chrome extension that extracted their browsing history; the researchers then used Twitter's proprietary URL-shortening protocol to identify t.co links. 81% of the top 15 results of each enquiry run through the de-anonymization program contained the correct re-identified user -- and 72% of the results identified the user in first place. Ultimately the trail only leads as far as a Twitter user ID, and if a user is pseudonymous, further action would need to be taken to affirm their real identity. Using https connections and VPN services can limit exposure to such re-identification attempts, though the first method does not mask the base URL of the site being connected to, and the second does not prevent the tracking cookies and other tracking methods which can provide a continuous browsing history. Additionally UTM codes in URLs offer the possibility of re-identification even where encryption is present. Further reading available via The Atlantic.
Pr0n (Score:4, Funny)
Re:Pr0n (Score:4, Funny)
My wife is my porn browsing history you insensitive clod!
Re:Pr0n (Score:5, Funny)
She's mine, too.
.
.
Sorry. It was a layup.
Idiots (Score:5, Insightful)
Well, there's your problem. STOP USING SOCIAL NETWORKS.
Re: (Score:1)
STOP USING SOCIAL NETWORKS
I'd also add stop calling them social networks. They are anti-social data mining platforms premised on pervasive user surveillance. Call them what they are: snoops.
Re: (Score:2)
This.
To be thorough, locate the circuit breaker panel for your location and flip all the switches you see from, "ON," to "OFF."
Drill holes in your smart phone(s) and tablet(s).
yw
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Better yet, don't exist.
Re:Solution (Score:4, Funny)
Hey, Ralph. Gotcha, you son of a bitch.
Clear your fucking browser history now and then.
See ya at work tomorrow.
And, seriously, Literotica?
Twitter? (Score:5, Insightful)
Exactly: If you use Twitter a lot, your public pro (Score:5, Interesting)
That's almost exactly what they did. First, they need your browser history. And your Twitter / Facebook profile needs to be wide open publicly. And you have to use Twitter regularly.
If they had been smarter, they would have just looked at which Facebook and Twitter profiles you visited most often, and from there inferred those are probably your closest friends. A list of your closest friends fairly well identifies your profile. They decided to make it a tad more complex, though.
Rather than looking at the friends list, they looked at links appearing in the person's feed. They reasoned that if the subject' browsing history shows them clicking in 50 links from a Twitter feed, it's probably an account that has those 50 links in their feed.
Re: (Score:2)
Before and after Firefox, I run the following .bat file:
[ ccleaner [howtogeek.com] ]
What is your method of cleaning up before and after opening your browser? Tips appreciated.
--
taskkill /f /im iexplore.exe /f /im firefox.exe /f /im chrome.exe /auto
taskkill
taskkill
RunDll32.exe InetCpl.cpl,ClearMyTracksByProcess 4351
cd\
cd C:\Program Files\CCleaner
ccleaner
exit
--
Re: (Score:3)
Or you can go a step further [slashdot.org].
Re: (Score:2)
You can create multiple templates and all you do in the templates is installing software and make generic configurations. The actual VM's where you run stuff is based on the templates and are reset whenever you restart them.
Re: (Score:2)
You probably want to use Qubes OS which provides an environment where all of this is handled for you.
I briefly covered this in a post from last year, [slashdot.org], which I linked to in the post you just replied to. I'm using Qubes right now.
OP was talking about Windows, though, and if it's true that he's not a regular Linux user then the Virtualbox solution is probably a better place to start.
Use Incognito, Privacy Mode? (Score:1)
Re: (Score:3, Informative)
Wouldn''t this part of the problem be solved simply by using the privacy mode of the browser? If not, use a Linux Live distribution, which typically have no persistent storage (although some of them have an overlay filesystem that can be enabled especially for this purpose). This can be combined with anonymizing software like Tor for enough protection against everybody else but government-backed attackers.
Whoops, bad advice. While it prevents the addition of new sites to the browser history, incognito mode doesn't erase the record of sites already visit. So it's better simply to create a new profile from scratch and then delete that profile. Now I think incognito mode is really a brain damaged idea, because it raises false expectations of privacy.
Re: (Score:2)
Whoops, bad advice. While it prevents the addition of new sites to the browser history, incognito mode doesn't erase the record of sites already visit. So it's better simply to create a new profile from scratch and then delete that profile. Now I think incognito mode is really a brain damaged idea, because it raises false expectations of privacy.
As well, your ISP is keeping records of you. There simply is no privacy on the intertoobz. It was never designed to be that way. And if you use TOR, there are others who will take great interest in you. About the only use of incognito mode is to keep your spouse from finding out about that shemale midget scat porn some folks like.
Re: (Score:3)
... shemale midget scat porn ...
So, no link?
No.
Because you only think about yourself.
Re: (Score:2)
... shemale midget scat porn ...
So, no link?
No.
Because you only think about yourself.
Shudder.... Well, figuring a rule 34 happening, I plunged in, did a DuckDuckGo, and.......
I think they actually do...Jeebuuz k. Rist! But I'm too afraid to click the links - imgine if the wife walks in when I'm looking at that! "It's not what it looks like honey! I'm doing important internet research - Seriously!!"
I mean Two Girls One Cup would be a walk in the park by comparison.
Re: (Score:2)
lol
From Uncle Sam's Yacht Club: The difference between a "sea story" and a "fairy tale" is, a fairy tale starts out with, "Once upon a time ..." and a sea story starts out with, "Hey; this ain't no shit ..."
So, hey. This ain't no shit:
Mobil Oil Corp systems analyst ca. late '90s ...
I was doing an overhead projection of the Internet (Netscape), showcasing how it could help with Just-In-Time Inventory research.
Lesson learned: Try shit before I make an ass of myself in front of all the suits.
I searched for, "s
Re: (Score:2)
I searched for, "stocking just in time inventory."
Up came a photo of a major trophy babe in fishnet stockings and little else at a site selling "Stockings just in time for Christmas and we have a huge inventory."
HAH! Well, sales probably went up, and I guess the presentation was kind of prophetic about the internet. "Yikes!" used to be a pretty risky search word - dunno, I haven't included it for years.
Re: (Score:2)
tor bridges just look like one a address ie like vpn but is tor. and vpns all your isps see is that you connect to that one address and its encrypted almost always and takes certs and logins as well as tor.
M'Kay.
Re:Use Incognito, Privacy Mode? (Score:5, Informative)
Re: (Score:2)
any page that contains a Twitter or Facebook button notifies these companies that you've visited the page
Until you install noscript, and tell it not to load scripts from other domains.
Re: (Score:1)
You don't get it. It's not about ~your choice and your precious NoScript~, princess. The server is still using its access logs, amongst many other techniques, in bad faith to fingerprint you.
TL;DR (Score:2)
People's Twitter profiles have been found out when following Twitter.
"they were able to correctly pick out the volunteers’ Twitter profiles" with the reason "People’s basic tendency to follow links they come across on Twitter"
The remaining 28% that they didn't correctly pick out probably didn't use Twitter and had nothing but cat videos.
So as long as you've given your real name... (Score:2)
...then they can identify you 72% of the time, otherwise the trail is cold. Brilliant!
Re: (Score:2)
Re: Some Suggestions for the Annoyed. (Score:3)
DDG dropped Google many years ago. They have many sources but the main source now is Bing.
Re: (Score:2)
I use the rest but thats a great list
I would suggest every normal email has some form of photo in it.
Use add one time pad looking steganography in every image even if only one had a real message every decade.
Consider "things you don't care about" when buying books, pad the order out with hobbies, sport, popular culture. Buying a lot of books one one topic at once or over time is telling.
Given the tracking and the numbers of VPN users with go
Re: (Score:2)
So my flip phone is still good?
Re: Smartphones, social media, and Windows 10 (Score:1)
For Win10:
W10Privacy
Simple DNSCrypt
HostsMan
For Smartyphoneee:
God help you if you want privacy or security. I have delved deep into their furthest recesses and can tell you they are a nightmare. If you don't want to drive yourself insane, slap a well vetted custom image on it, an adblocker, a firewall, a app permission management app, and treat it like an car salesman.
Social media:
Biggest sham of the century. PURGE!
Re: (Score:2)
oh bullshit (Score:2)
they weren't browsing anonymously (Score:3)
That's quite odd (Score:2)
I'd have thought that over 80%, not under, could be identified just by what they browse. Mainstream being stereotypically homogenous, and everything.
Simple Solution (Score:2)