iTnews
  • Home
  • News
  • Technology
  • Security

Your 'anonymous' browsing history can reveal your identity

By Allie Coyne on Feb 8, 2017 11:47AM
Your 'anonymous' browsing history can reveal your identity

Researchers find 72 percent of histories can be associated with users.

Researchers have managed to pin anonymised web browsing histories back to an individual and reveal their identity in almost three-quarters of cases.

Stanford and Princeton university researchers matched anonymous browsing histories with publicly available information on social networks like Twitter to reveal the user's identity in their study De-anonymizing Web Browsing Data with Social Networks.

The researchers started their study with the assumption that the set of links appearing in an individual's browsing history is likely unique to a single person.

"Since users are more likely to click on links posted by accounts that they follow, these distinctive patterns persist in their browsing history," they wrote.

"An adversary can thus de-anonymise a given browsing history by finding the social media profile whose “feed” shares the history’s idiosyncratic characteristics."

They gave 374 individuals a Chrome extension that extracted their browsing history and picked out the t.co (Twitter) links to run them through a de-anonymisation program.

Within seconds, the researchers had 15 possible Twitter identities in order of probability. The subjects were asked which profile was theirs, with the algorithm spitting out the correct identity as the top candidate in the list 72 percent of the time.

In 81 percent of cases the user's profile was within that top 15 list. The more URLs in the browsing history, the greater chance of success, they found.

The same approach worked for Facebook and Reddit profiles, the researchers found: Facebook identities can be linked based on likes, and Reddit identities based on comments, "albeit incompletely and with some error".

Further work to identify the user was required in cases where the user had an anonymous social network profile, however.

The study showed that ''anyone with access to browsing histories — a great number of companies and organisations  — can identify many users by analysing public information from social media accounts", the researchers said.

Anonymous browsing histories are sold to advertisers so they can better target their advertisements. Data brokers generally sell this information in pieces based on tracking cookies, but more valuable are complete profiles of a single, anonymous user.

To protect against advertisers and malicious actors being able to pin these full profiles back to a specific individual, the researchers recommended using the TOR browser as the strongest defence.

Ad blockers and VPN services can also help restrict the collection of browsing data, as will browsing only HTTPS sites, which mask details about visits to URLS with the HTTPS prefix.

While private modes like Google's incognito delete browser history once the window is closed, they don't block cookies and trackers from keeping a trail of a user's traffic.

The researchers' paper will be presented at the 2017 World Wide Web Conference in Perth in April.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
anonymousbrowserprivacysecurity

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats
How to turn digital complexity into competitive advantage
Promoted Content How to turn digital complexity into competitive advantage
"We're seeing some good policy put in place, but that's the exception"
Partner Content "We're seeing some good policy put in place, but that's the exception"

Sponsored Whitepapers

Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see
Beyond FTP: Securing and Managing File Transfers
Beyond FTP: Securing and Managing File Transfers
NextGen Security Operations: A Roadmap for the Future
NextGen Security Operations: A Roadmap for the Future
Video: Watch Juniper talk about its Aston Martin partnership
Video: Watch Juniper talk about its Aston Martin partnership

Events

  • Micro Focus Information Management & Governance (IM&G) Forum 2022
  • CRN Channel Meets: CyberSecurity Live Event
  • IoT Insights: Secure By Design for manufacturing
  • Cyber Security for Government Summit
By Allie Coyne
Feb 8 2017
11:47AM
0 Comments

Related Articles

  • The Good Guys pauses facial recognition trial
  • Google delays Chrome's blocking of tracking cookies to late 2023
  • Qld gov proposes mandatory data breach reporting for agencies
  • Adelaide council rules out facial recognition on city CCTV network
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Qantas calls time on IBM, Fujitsu in tech modernisation

Qantas calls time on IBM, Fujitsu in tech modernisation

Service NSW hits digital services goal two years early

Service NSW hits digital services goal two years early

NBN Co taking orders for 'non-premises' connections

NBN Co taking orders for 'non-premises' connections

Australian scientists build world's first quantum computer IC

Australian scientists build world's first quantum computer IC

Digital Nation

COVER STORY: Operationalising net zero through the power of IoT
COVER STORY: Operationalising net zero through the power of IoT
The security threat of quantum computing
The security threat of quantum computing
IBM global chief data officer on the rise of the number crunchers
IBM global chief data officer on the rise of the number crunchers
Crypto experts optimistic about future of Bitcoin: Block
Crypto experts optimistic about future of Bitcoin: Block
Integrity, ethics and board decisions in the digital age
Integrity, ethics and board decisions in the digital age
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.