Talk:Evercookie
This article was nominated for deletion on 27 October 2010. The result of the discussion was nomination withdrawn. |
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||||||||||||
|
Wiki Education Foundation-supported course assignment
[edit]This article was the subject of a Wiki Education Foundation-supported course assignment, between 19 September 2020 and 19 December 2020. Further details are available on the course page. Student editor(s): Exploredragon. Peer reviewers: Jameswang323, Bobalily, Plusoneplusone, Showtime oski, Hiiisparks, SpongebobSquarepants25, Lolabaylo, HanMiKC, Lilmeowmeow3161.
Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 20:59, 16 January 2022 (UTC)
Untitled
[edit]Can we please remove the deletion notice now? Categories have been added.
Deleting
[edit]The article claims evercookies have only been deleted on iPhone, but BleachBit 0.8.2 easily deletes evercookies on Linux and Windows. Check the boxes for Adobe Flash and for each browser: cache, temporary files, history, cookies, and DOM storage. I may have a COA, so I won't write this in the article itself. AndrewHZ (talk) 19:35, 24 December 2010 (UTC)
- Yeah, that claim is BS. I removed it. 65.37.33.10 (talk) 18:19, 5 April 2011 (UTC)
Not so "difficult to delete" after all...
[edit]With Windows XP, IE 8, Flash set to prompt when a website requests storage, and Silverlight not installed, I can apparently delete the demo "cookie" at http://samy.pl/evercookie/ simply with Internet Options > Delete Cookies and Temporary Internet Files. (It doesn't even prompt me for the Flash storage.) Not very "difficult to delete" after all, then... —Preceding unsigned comment added by 86.179.119.45 (talk) 21:18, 3 March 2011 (UTC)
- The entire article appears to be written in unnecessarily sensationalist tone, and the last remaining techniques used by Evercookie weren't really working since 2016-2018. This 2020 paper found that none of the major browsers persisted cookies set by Evercookies while in privacy mode or when cookies were cleaned: https://faui1-files.cs.fau.de/public/publications/df/df-whitepaper-18.pdf PaulT2022 (talk) 12:48, 6 October 2022 (UTC)
Usage Bias?
[edit]The first 2/3s of the Usage section sounds like marketing promo for Evercookie (a piece of software that deliberately circumvents the browser user's explicit intentions). This seems like biased POV writing (for the 99% of users who want their browser to delete cookies when they tell it to, there is nothing about Evercookie that is 'ideal' nor has it any 'advantage'). 62.232.250.18 (talk) 13:28, 8 April 2014 (UTC)
- Agree. I don't think the point was intentional. Seems like the text was lifted from a source that was more marketing focused. If the advantages of it's marketing are to be included then the potential threat to a User's privacy and the possibility that they can be misused should be included as well.Jonny Quick (talk) 21:07, 5 February 2015 (UTC)
Include Removal Methods
[edit]The article's description of how the Evercookie resists deletion reads just like the definition of malware. Given that, it seems appropriate to me to give the reader some kind of hint or indicator on how to remove these Evercookies, and the possible consequences of doing so. Not necessarily a full-blown Guide, but at least something.Jonny Quick (talk) 21:03, 5 February 2015 (UTC)
"Usage" section removed
[edit]I have removed the section called "Usage" from this article, and would like to explain why. (1) The first paragraph gave no sources. (2) The second paragraph contained a dubious assertion, and the listed source is a web page that no longer exists (or at any rate can't be reached). There are other parts of this article that strike me as inadequately sourced, but the section I removed was clearly the worst. Looie496 (talk) 17:39, 19 August 2015 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just modified one external link on Evercookie. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20100529082335/http://www.adobe.com/products/flashplayer/articles/lso/ to http://www.adobe.com/products/flashplayer/articles/lso/
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 19:12, 27 December 2016 (UTC)
Suggested bibliography
[edit]Andrés, José Angel González. 2011. “Identity Denial in Internet.” Inteligencia y Seguridad 2011(10):75–101.
Anon. 2013. “Dataveillance and Countervailance.” "Raw Data" Is an Oxymoron.
Ayenson, Mika, Dietrich James Wambach, Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle. 2011. “Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning.” SSRN Electronic Journal.
Azad, Babak Amin, Oleksii Starov, Pierre Laperdrix, and Nick Nikiforakis. 2020. “Web Runner 2049: Evaluating Third-Party Anti-Bot Services.” Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science 135–59.
Boda, Károly, Ádám Máté Földes, Gábor György Gulyás, and Sándor Imre. 2012. “User Tracking on the Web via Cross-Browser Fingerprinting.” Information Security Technology for Applications Lecture Notes in Computer Science 31–46.
Bowman, Laura J. 2012. “Pulling Back the Curtain: Online Consumer Tracking.” Journal of Law and Policy for the Information Society 7.
Bujlow, Tomasz, ValenT Ín Carela-Espanol, Josep Sole-Pareta, and Pere Barlet-RosProceedings of the IEEE. 2017. “A Survey on Web Tracking: Mechanisms, Implications, and Defenses.” Proceedings of the IEEE 105:1476–1510.
Davik, Christine Suzanne. 2013. “We Know Who You Are and What You Are Made Of: The Illusion of Internet Anonymity and Its Impact on Protection from Genetic Discrimination.” Case Western Reserve Law Review 64(1).
Hennigan, Eric, Christoph Kerschbaumer, Stefan Brunthaler, and Michael Franz. n.d. “Tracking the Information Flow for Dynamically Typed Programming Languages by Instruction Set Extension.” Research Gate. Retrieved (https://www.researchgate.net/publication/266885652_Tracking_Information_Flow_for_Dynamically_Typed_Programming_Languages_by_Instruction_Set_Extension).
Hoofnagle, Chris Jay, Ashkan Soltani, Nathaniel Good, Dietrich J. Wambach, and Mika D. Ayenson. 2012. “Behavioral Advertising: The Offer You Cannot Refuse.” Harvard Law & Policy Review 6.
Hupperich, Thomas, Henry Hosseini, and Thorsten Holz. 2016. “Leveraging Sensor Fingerprinting for Mobile Device Authentication.” Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science 377–96.
Kamara, Irene and Eleni Kosta. 2016. “Do Not Track Initiatives: Regaining the Lost User Control.” International Data Privacy Law 6(4):276–90.
Kramar, Tomas, Michal Barla, and Maria Bielikova. 2012. “ PERSONALIZING SEARCH USING SOCIALLY ENHANCED INTEREST MODEL, BUILT FROM THE STREAM OF USER’S ACTIVITY.” Journal of Web Engineering 12.
Steindel, Tracy A. 2011. “A Path toward User Control of Online Profiling.” Michigan Telecommunications and Technology Law Review 17(2).
Urban, Tobias, Dennis Tatang, Thorsten Holz, and Norbert Pohlmann. 2018. “Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs.” Computer Security Lecture Notes in Computer Science 449–69.
Arthur S. Hayes (2014) The USPS as an OSP: A Remedy for Users’ Online Privacy Concerns, Communication Law and Policy, 19:4, 465-507, DOI: 10.1080/10811680.2014.955770
Heckman, Kristin E., Frank J. Stech, Roshan K. Thomas, Ben Schmoker, and Alexander W. Tsow. 2015. “Cyber Denial, Deception and Counter Deception.” Advances in Information Security.
Ayala, Luis. 2016. Cybersecurity Lexicon.
Christl, Wolfie and Sarah Spiekermann. 2016. Networks of Control a Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy. Wien: facultas.
Fifield, David and Serge Egelman. 2015. “Fingerprinting Web Users Through Font Metrics.” Financial Cryptography and Data Security Lecture Notes in Computer Science 107–24. Exploredragon (talk) 02:13, 19 October 2020 (UTC) Exploredragon (talk) 17:19, 21 October 2020 (UTC)
Edited Lead Section
[edit]I contributed to the lead section by adding more information on evercookie's applications and relations with other tracking mechanisms. I also incorporated the old version into the new one, and I also added more references to the topic. Exploredragon (talk) 23:59, 2 November 2020 (UTC)
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class software articles
- Low-importance software articles
- Start-Class software articles of Low-importance
- All Software articles
- Start-Class Websites articles
- Mid-importance Websites articles
- Start-Class Websites articles of Mid-importance
- All Websites articles
- Start-Class Computer Security articles
- High-importance Computer Security articles
- Start-Class Computer Security articles of High-importance
- All Computer Security articles
- All Computing articles
- Start-Class Internet articles
- Mid-importance Internet articles
- WikiProject Internet articles
- Unknown-importance Computing articles