Skip to content

Attack presentation for EECS 588. We investigate methods of retrieving user's browsing history as well as been able to identify them based on their browser fingerprint

Notifications You must be signed in to change notification settings

luismolina13/no-privacy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

no-privacy

Attack presentation for EECS 588. We investigate methods of retrieving user's browsing history as well as been able to identify them based on their browser fingerprint


Part 1: Implement and demonstrate CSS history sniffing, timing-based history sniffing, and browser fingerprinting. Explain how Tor attempts to defend against these techniques. Browser Fingerprint

Part 2: Select a widely deployed web bug and instrument your browser to monitor it. Display the data the web bug reports as it tracks you across various popular sites. Explain how sites could use client-side tracking to show targeted ads with far less invasion of privacy. Implemented as a chrome plugin here

About

Attack presentation for EECS 588. We investigate methods of retrieving user's browsing history as well as been able to identify them based on their browser fingerprint

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published