Wired.com and Huffington Post Amongst List of Privacy-Invading Websites
A new paper (pdf) from researchers at the University of California, San Diego reveals that a significant proportion of the 50,000 most-visited sites on the web are engaging in some level of behavioral tracking. Furthermore, and more disturbingly, a few are actually examining your browser’s history to determine what other sites you visit, exploiting a security vulnerability known about for a decade.
Not all of the transgressions uncovered by lead author Dongseok Jan are equally invasive. Less offensive are sites like Wired, Technorati, Answerbag, and Perez Hilton, which are using analytics service Tynt.com to, for example, track what content users are copying and pasting from their websites, a process called “behavior sniffing.” More worrisome is behavior known as “history sniffing,” in which a site uses javascript to query a browser about what sites its users have visited previously. Jan’s list includes 46 websites engaging in this behavior.
Youporn.com, which determines whether a user has visited its competitors’ websites, even went so far as to engage in a primitive form of cryptography in order to hide the URLs of the sites it’s asking about.
History sniffing works because browsers change the color of links a user has already visited: the javascript used on these sites simply queries those specific links to see if their color has been changed. The exploit does not work in Google’s Chrome or Apple’s Safari browsers, and a fix for Firefox is available in its newest version. Internet Explorer, however, remains vulnerable to this exploit.
The researchers singled out the Huffington Post for special opprobrium:
Suspicious website While investigating several sites that installed event handlers, we also found that the huffingtonpost.com site exhibits suspicious behavior. In particular, every article on the site’s front page has an on-mouse-over event handler. These handlers collect in a global data structure information about what articles the mouse passes over. Despite the fact the information is never sent on the network, we still consider this case to be suspicious because not only is the infrastructure present, but it in fact collects the information locally.
Morningstar.com has reported that it had no idea it was collecting this information, which appears to have been gathered by an ad network, called Interclick, running banners on its site. Interclick claims that the history sniffing it engaged in was simply an attempt to gather quality-control data to verify the anonymized data it gets from other sources. This data allows it to segment users by type, for example, car enthusiast, technology buyer, juggalo, etc.
For more on this discovery, including the custom web browsing engine the researchers built to examine the javascript of thousands of websites, check out the UCSD press release and the original paper (pdf).
This post is indebted to the uncommonly good (and thorough) technology reporting of Forbes.com’s Kashmir Hill.
Keep Reading
Most Popular
Large language models can do jaw-dropping things. But nobody knows exactly why.
And that's a problem. Figuring it out is one of the biggest scientific puzzles of our time and a crucial step towards controlling more powerful future models.
How scientists traced a mysterious covid case back to six toilets
When wastewater surveillance turns into a hunt for a single infected individual, the ethics get tricky.
The problem with plug-in hybrids? Their drivers.
Plug-in hybrids are often sold as a transition to EVs, but new data from Europe shows we’re still underestimating the emissions they produce.
Stay connected
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.