Presentation is loading. Please wait.

Presentation is loading. Please wait.

SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010.

Similar presentations

Presentation on theme: "SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010."— Presentation transcript:

1 SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010

2 A Primer on Information Theory and Privacy Peter Eckersley Around 7 billion people on planet... gender, zip code and birth date is each partially identifying information combining these pieces of information is likely to get you a unique person if you can combine that info w/ a dataset tied to names or ssn then you can probably ID the individual

3 IP address - guess at zipcode by where they log in from? - track visits w/ cookies - image cache

4 IP address (WHOIS) track visits w/ cookies - image cache

5 "Browser fingerprinting"

6 USER AGENT STRING HTTP Protocol browser sends info about itself to server when making request

7 Mozilla/5.0 (Windows; U; Windows NT 5.1; en-GB; rv: ) Gecko/ Firefox/ tells website what browser version, operating system and version. (Can be used by developers to format content for different browsers.)

8 "if you pick a random person's browser, only one in 1,500 other Internet users will share their User Agent string."

9 type this into browser window: javascript:alert(navigator.userAgent) Panopticlick – EFF "I'M UNIQUE!!!"

10 If Javascript enabled server can even detect what fonts you have installed variety of plug-ins and screen sizes helps add identifying info phone browsers tend to be less uinique because less variables in plugins and screen sizes

11 could disable javascript but many sites require javascript to work correctly could toggle javascript but you don't always know when you need it Browser mfgs. could make data less sepcific or could provide two modes - specific and generalized


13 TOR software + network of virtual tunnels journalists whistleblowers dissidents those not wanting to reveal socially sensitive info about themselves – illnesses, victims of abuse

14 makes browsing slower Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet use HTTPS or other end-to-end encryption and authentication.

15 While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.

Download ppt "SOCIAL WEB MEDIA privacy and data mining part 2 4/12/2010."

Similar presentations

Ads by Google