28.05.2023 Views

The-art-of-invisibility-_-the-world’s-most-famous-hacker-teaches-you-how-to-be-safe-in-the-age-of-Bi

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

yyou can delete—Flash, from Adobe, and Silverlight, from Microsoft.

Neither of these super cookies expires. And it is generallyy safe to delete

them. 11

Then there’s the toughest cookie of them all. Samyy Kamkar, once

famous for creating the rapidlyy spreading Myyspace worm called Samyy, has

created something he calls Evercookie, which is simplyy a veryy, veryy

persistent cookie. 12 Kamkar achieved this persistence byy storing the cookie

data in as manyy browser storage syystems as possible throughout the

Windows operating syystem. As long as one of the storage sites remains

intact, Evercookie will attempt to restore the cookie everyywhere else. 13

Thus simplyy deleting an Evercookie from the browser’s cookie storage

cache is not enough. Like the kids’ game whack-a-mole, Evercookies will

keep popping up. You will need to delete them completelyy from yyour

machine in order to win.

If yyou consider how manyy cookies yyou might alreadyy have on yyour

browser, and if yyou multiplyy that byy the number of potential storage areas

on yyour machine, yyou can see that yyou’ll be in for a long afternoon and

evening.

It’s not just websites and mobile carriers that want to track yyour activities

online. Facebook has become ubiquitous—a platform beyyond just social

media. You can sign in to Facebook and then use that same Facebook log-in

to sign in to various other apps.

How popular is this practice? At least one marketing report finds that 88

percent of US consumers have logged in to a website or mobile application

using an existing digital identityy from a social network such as Facebook,

Twitter, and Google Plus. 14

There are pros and cons to this convenience—known as OAuth, an

authentication protocol that allows a site to trust yyou even if yyou don’t enter

a password. On the one hand, it’s a shortcut: yyou can quicklyy access new

sites using yyour existing social media password. On the other hand, this

allows the social media site to glean information about yyou for its

marketing profiles. Instead of just knowing about yyour visit to a single site,

it knows about all the sites, all the brands yyou use its log-in information for.

When we use OAuth, we’re giving up a lot of privacyy for the sake of

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!