TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Mozilla research: Browsing histories are unique enough to identify users

238 pointsby chris_falmost 5 years ago

18 comments

Groxxalmost 5 years ago
I feel inclined to say &quot;... well yeah, obviously&quot;.<p>Not in the &quot;obvious in retrospect&quot; way, but because browsers have been progressively blocking history-sniffing tactics for <i>years</i> precisely because advertisers were using it to identify visitors.<p>Did this research... establish better numbers around it or something?
评论 #24348000 未加载
评论 #24351267 未加载
评论 #24352174 未加载
the_jeremyalmost 5 years ago
Who is able to get access to my browser history? I thought it was just my ISP&#x2F;VPN, which can obviously track me better in other ways.
评论 #24343417 未加载
评论 #24347410 未加载
评论 #24347532 未加载
评论 #24347977 未加载
评论 #24350267 未加载
评论 #24349151 未加载
评论 #24348054 未加载
评论 #24351285 未加载
评论 #24343475 未加载
评论 #24348039 未加载
评论 #24347696 未加载
axegon_almost 5 years ago
That&#x27;s hardly surprising. I mean browsers hand out willingly plenty of information that could be used for pretty accurate identifications. Just scrolling through my scores on amiunique[1], many of the parameters put me in the 0.01% category.<p>[1] <a href="https:&#x2F;&#x2F;amiunique.org&#x2F;fp" rel="nofollow">https:&#x2F;&#x2F;amiunique.org&#x2F;fp</a>
评论 #24351777 未加载
评论 #24350938 未加载
3npalmost 5 years ago
To this me and a friend started sketching on a VPN&#x2F;HTTP proxy that will have a set of say 100 outgoing IPs, look at the domains being connected to and distribute request destinations over IPs.<p>So e.g. Google would always see the same IP, which would be different from the one Facebook sees.<p>While access times cross-references and identification is still theoretically possible, it should be an entirely different game.<p>Would anyone else reading this be interested in working on this or joining in? I&#x27;m not thinking to make it a startup or business per se but 1) reliable IPs are a bit too expensive to make sense for just 1 person 2) anonymity in numbers.<p>I&#x27;m thinking ideal would be something FOSS and easy to self-host and replicate so you can pool together a group of friends for a shared VPN among semi-trusted parties (at least the user should trust the operator to not index requests and sell the data, and the operator should trust users to not run botnets)
评论 #24349024 未加载
评论 #24349292 未加载
评论 #24351122 未加载
评论 #24349547 未加载
LatteLazyalmost 5 years ago
Here in the UK, date of birth and post code is enough to identify something like 95% of people. Anonymised data sets are not really possible once you have more than a few varriables. Most people don&#x27;t know this.
评论 #24348128 未加载
评论 #24348305 未加载
评论 #24347764 未加载
yaloginalmost 5 years ago
Intuitively there are tons of things we do on our computers that uniquely identify. I am sure the adware companies know a ton more and are not public too. The need for strict privacy preserving tech is needed across the whole stack.
dmos62almost 5 years ago
By looking at all the data available to untrusted sites (as seen in <a href="https:&#x2F;&#x2F;amiunique.org&#x2F;fp" rel="nofollow">https:&#x2F;&#x2F;amiunique.org&#x2F;fp</a>) you can tell that Web is many many years away from being privacy conscious. List of fonts, canvas fingerprinting, timezone, OS, user agent... the list goes on and on. Those of us who are tech-literate know better than to create tech like this today, but there&#x27;s just too much momentum (and shady interests) to hot-swap Web for something else.
aaron695almost 5 years ago
I think this is as stupid as it sounds from the paper - <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;soups2020&#x2F;presentation&#x2F;bird" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;conference&#x2F;soups2020&#x2F;presentation&#x2F;bir...</a><p>Why not &quot;Mozilla research: We asked users for their name and address and the ones telling the truth we could identify&quot;<p>TOR is fighting identifying users from the screen size of their window when maximised.<p>Here&#x27;s the original paper which is more about how you can access the browsers histories - <a href="https:&#x2F;&#x2F;www.petsymposium.org&#x2F;2012&#x2F;papers&#x2F;hotpets12-4-johnny.pdf" rel="nofollow">https:&#x2F;&#x2F;www.petsymposium.org&#x2F;2012&#x2F;papers&#x2F;hotpets12-4-johnny....</a><p>Can you still access browsers histories? I&#x27;d have to guess no way without a zeroday. The original site is down. <a href="http:&#x2F;&#x2F;www.wtikay.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.wtikay.com&#x2F;</a> Firefox fixed it - <a href="https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=147777" rel="nofollow">https:&#x2F;&#x2F;bugzilla.mozilla.org&#x2F;show_bug.cgi?id=147777</a>
moonchildalmost 5 years ago
Wasn&#x27;t it shown by aol researchers 20 years ago that search histories are uniquely identifying? If so, this seems hardly surprising, as browser history should be a superset of search history.
amaialmost 5 years ago
As counterstrategy you can use tools like <a href="http:&#x2F;&#x2F;trackmenot.io&#x2F;" rel="nofollow">http:&#x2F;&#x2F;trackmenot.io&#x2F;</a><p>&quot;TrackMeNot runs as a low-priority background process that periodically issues randomized search-queries to popular search engines, e.g., AOL, Yahoo!, Google, and Bing. It hides users&#x27; actual search trails in a cloud of &#x27;ghost&#x27; queries, significantly increasing the difficulty of aggregating such data into accurate or identifying user profiles. &quot;
评论 #24351520 未加载
MaxBarracloughalmost 5 years ago
The <i>Evercookie</i> (hard-to-delete cookie-like system in JavaScript) and <i>Panopticlick</i> (browser fingerprinting) projects may also be of interest:<p><a href="https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Evercookie" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Evercookie</a><p><a href="https:&#x2F;&#x2F;panopticlick.eff.org&#x2F;" rel="nofollow">https:&#x2F;&#x2F;panopticlick.eff.org&#x2F;</a>
g42gregoryalmost 5 years ago
Interesting. I also think that the browser signature, together with IP address, will probably come very close to uniquely identifying users.
评论 #24347724 未加载
评论 #24347605 未加载
jedisct1almost 5 years ago
So can DNS queries.
vlovich123almost 5 years ago
I suspect privacy would be better served by taking the approach of the security domain with responsible disclosure to vendors and a concerted effort to attack the problem holistically. Until then we’re just giving privacy attackers a heads up and by the time this issue is mitigated their onto the next avenue for bypassing privacy.
hktalmost 5 years ago
Time for a browser plugin that will generate random noise - adding junk into history.
评论 #24348410 未加载
评论 #24348384 未加载
评论 #24351210 未加载
wombatmobilealmost 5 years ago
If the study establishes that for all practical purposes, online anonymity is impossible to maintain for average users, what are the implications (a) for the average user; (b) for the economy; and (c) for society?
评论 #24348672 未加载
Lordarminiusalmost 5 years ago
Mine certainly i, since I tend to visit the same ten sites over and over again
optionalmost 5 years ago
so are amazon&#x2F;itunes&#x2F;appstore&#x2F;googleplay&#x2F;netflix-views&#x2F;etc