How Unique Is Your Web Browser?

Publié le 6 juillet 2018

Créée le 6 juillet 2018

We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configura- tion information that they will transmit to websites upon request. We implemented one possible fingerprinting algorithm, and collected these fingerprints from a large sample of browsers that visited our test side, panopticlick.eff.org. We observe that the distribution of our finger- print contains at least 18.1 bits of entropy, meaning that if we pick a browser at random, at best we expect that only one in 286,777 other browsers will share its fingerprint. Among browsers that support Flash or Java, the situation is worse, with the average browser carrying at least 18.8 bits of identifying information. 94.2% of browsers with Flash or Java were unique in our sample.

By observing returning visitors, we estimate how rapidly browser finger- prints might change over time. In our sample, fingerprints changed quite rapidly, but even a simple heuristic was usually able to guess when a fin- gerprint was an “upgraded” version of a previously observed browser’s fingerprint, with 99.1% of guesses correct and a false positive rate of only 0.86%.

We discuss what privacy threat browser fingerprinting poses in practice, and what countermeasures may be appropriate to prevent it. There is a tradeoff between protection against fingerprintability and certain kinds of debuggability, which in current browsers is weighted heavily against pri- vacy. Paradoxically, anti-fingerprinting privacy technologies can be self- defeating if they are not used by a sufficient number of people; we show that some privacy measures currently fall victim to this paradox, but others do not.

AUTEURS

Peter Eckersley

Electronic Frontier Foundation

Posté par

Daniel Le Métayer

Research director

Commentaires

Laisser un commentaire

* Tous les champs suivis d'un astérisque sont obligatoires

Votre commentaire sera révisé par le site si nécessaire.