- People are roasting this ‘traditional’ take on marriage with a hilarious meme Saturday 5:17 PM
- The internet just collectively realized that the Neopets of the world must be hungry Saturday 4:00 PM
- Alt-right message board 8chan was served a search warrant Saturday 3:06 PM
- O.J. Simpson just joined Twitter in the most bizarre fashion Saturday 1:20 PM
- Prominent phone-hacking firm says it can unlock any iPhone for law enforcement Saturday 12:39 PM
- Hundreds of police officers belong to extremist Facebook groups, investigation finds Saturday 9:31 AM
- How to watch Tyson Fury vs. Tom Schwarz online Saturday 8:00 AM
- ‘Late Night’ is a disappointing, tepid comedy Saturday 7:00 AM
- How to stream ‘Love It or List It’ for free Saturday 7:00 AM
- How to watch the 2019 Concacaf Gold Cup online for free Saturday 6:55 AM
- Borderlands 3 preview suggests the aging series can still hang with the cool kids Saturday 6:30 AM
- How to stream the 2019 College World Series for free Saturday 6:00 AM
- Police try to solve domestic violence by giving victims blunt kitchen knives Friday 5:40 PM
- Privacy activist Ola Bini detained for 2 months in Ecuador without charges Friday 5:01 PM
- Twitter says suspending ‘God’ for a pro-LGBTQ tweet was an ‘error’ Friday 4:14 PM
The campaigns’ websites have failed to protect their users’ data from third-party trackers.
Representatives of both the Romney and the Obama campaigns have put their foot down: no data on their respective website users will be released. In fact, “safeguards” have been put in place to protect against that very possibility.
But those safeguards apparently weren’t sufficient to keep supporters of the two campaigns from being tracked online.
As Natasha Singer reported on the New York Times Bits blog, both camps are leaking information to third parties.
Jonathan Mayer of Stanford has released a new report putting the lie to the campaigns’ assertions of security.
“Leaking” in this case is not someone consciously, purposefully slipping info to a shady fellow in a parking garage. Mayer, a grad student in computer science, explains the mechanism in a blog post.
Leakage most commonly occurs when a website includes identifying information in a page URL or title. Embedded third parties receive the identifying information if they receive the URL (e.g. referrer headers) or the title (e.g.document.title). Even a little identifying information leakage thoroughly undermines the privacy properties of web tracking: once a user’s identity leaks to a tracker, all of the tracker’s past, present, and future data about the user becomes identifiable.
Some of these third party groups, according to Mayer, include companies who provide services for “advertising, analytics, social network integration, and more.”
This cyber-stalking worries privacy advocates because, on top of being creepy, it can also bring the profound irritation of a never-ending spam avalanche.
As Mayer says, “Even a little identifying information leakage thoroughly undermines the privacy properties of web tracking: once a user’s identity leaks to a tracker, all of the tracker’s past, present, and future data about the user becomes identifiable.”
Photo by Eli Christman/Flickr
Curt Hopkins has over two decades of experience as a journalist, editorial strategist, and social media manager. His work has been published by Ars Technica, Reuters, Los Angeles Times, and San Francisco Chronicle. He is the also founding director of the Committee to Protect Bloggers, the first organization devoted to global free speech rights for bloggers