Full Text of the Decision in English

Total Page:16

File Type:pdf, Size:1020Kb

Full Text of the Decision in English RÉPUBLIQUE FRANÇAISE Only the French version is authentic and it prevails in the event of its differing from the translated version. Decision 19-D-26 of 19 December 2019 regarding practices employed in the online search advertising sector* The Autorité de la concurrence (section IV), Having regards to the letter registered on 6 March 2015 under number 15/0019 F, by which Gibmedia referred to the Autorité de la concurrence practices employed by Google Inc. (now Google LLC) and Google Ireland Ltd; Having regards to Article 102 of the Treaty on the Functioning of the European Union (TFEU); Having regards to Book IV of the French Code of Commercial Law (Code de commerce) and particularly Article L. 420-2 thereof; Having regards to Decision 15-D-13 of 9 September 2015 regarding a request by Gibmedia for interim measures; Having regards to the Decisions on business secrecy 16•DSA•189 of 19 July 2016, 19•DSADEC•193 of 29 May 2019, 16•DSA•193 of 20 July 2016, 18•DSA•074 of 9 March 2018, 16•DSA•195 of 21 July 2016, 16•DSA•91 of 13 April 2016, 16•DSA•124 of 3 June 2016, 16•DSA•125 of 3 June 2016, 16•DSA•126 of 3 June 2016, 18•DEC•078 of 12 March 2018, 17•DSA•214 of 18 May 2017, 16•DSA•05 of 7 January 2016, 17•DSA•058 of 8 February 2017, 16•DSA•198 of 25 July 2016, 16•DSA•199 of 25 July 2016, 16•DSA•200 of 25 July 2016, 15•DSA•385 of 20 November 2015, 16•DSA•127 of 6 June 2016, 16•DSA•128 of 6 June 2016, 16•DSA•129 of 6 June 2016, 16•DSA•130 of 6 June 2016, 16•DSA•131 of 6 June 2016, 16•DSA•99 of 18 April 2016, 16•DSA•203 of 27 July 2016, 16•DSA•132 of 8 June 2016, 16•DSA•133 of 8 June 2016, 16•DSA•134 of 8 June 2016, 16•DSA•206 of 28 July 2016, 17•DSA•218 of 23 May 2017, 16•DSA•60 of 4 March 2016, 16•DSADEC•01 of 23 March 2016, 18•DSA•086 of 21 March 2018, 16•DSA•136 of 13 June 2016, 16•DSA•141 of 13 June 2016, 16•DSA•207 of 2 August 2016, 17•DSA•227 of 30 May 2017, 17•DSA•228 of 30 May 2017, 17•DSA•229 of 30 May 2017, 17•DSA•230 of 31 May 2017, 17•DSA•231 of 31 May 2017, 17•DSA•232 of 31 May 2017, 17•DSA•233 of 31 May 2017, 17•DSA•234 of 31 May 2017, 17•DSA•235 of 31 May 2017, 17•DSA•236 of 31 May 2017, 17•DSA•237 of 31 May 2017, 1 17•DSA•238 of 31 May 2017, 17•DSA•297 of 20 July 2017, 18•DECR•338 of 17 October 2018, *Non-confidential version 2 18-DEC-339 of 11 October 2018, 18-DECR-340 of 11 October 2018, 18-DECR-341 of 11 October 2018, 18-DECR-342 of 11 October 2018, 18-DECR-343 of 11 October 2018, 18-DECR-344 of 11 October 2018, 18-DEC-345 of 15 October 2018, 18-DECR-346 of 11 October 2018, 18-DEC-347 of 11 October 2018, 18-DECR-348 of 11 October 2018, 17•DSA-241 of 1 June 2017, 17-DSA-242 of 1 June 2017, 17-DSA-085 of 22 February 2017, 19-DSA-533 of 25 September 2019, 17-DSA-002 of 4 January 2017, 18•DEC-353 of 15 October 2018, 18-DEC-360 of 16 October 2018, 19-DSA-098 of 14 March 2019, 18•DECR-357 of 17 October 2018, 18-DSA-361 of 17 October 2018, 16•DSA-29 of 2 February 2016, 16-DSA-32 of 4 February 2016, 16-DSA-40 of 11 February 2016, 16•DSA•177 of 8 July 2016, 16-DSA-178 of 8 July 2016, 16-DSA-237 of 22 August 2016, 16•DSA-240 of 22 August 2016, 16-DSA-244 of 22 August 2016, 16•DSA-246 of 22 August 2016, 16-DSA-247 of 22 August 2016, 16-DSA-337 of 10 October 2016, 16-DSA-339 of 12 October 2016, 16-DSA-342 of 17 October 2016, 16•DSA-363 of 26 October 2016, 17•DSA-110 of 13 March 2017, 17-DSA-121 of 17 March 2017, 17-DSA-193 of 10 May 2017, 17-DSA-203 of 11 May 2017, 17-DSA-253 of 13 June 2017, 17-DSA-254 of 13 June 2017; Having regards to the observations submitted by Gibmedia, Alphabet Inc., Google LLC, Google Ireland Ltd, Google France and the representative of the Minister of the Economy; Having regards to the note of 30 October 2019 submitted during the deliberations by the Google companies; Having regards to the other evidence in the case; The case officers (rapporteurs), the Deputy General Rapporteur, the representative of the Minister of the Economy and the representatives of Gibmedia, Alphabet Inc., Google LLC, Google Ireland Ltd and Google France, having been heard at the hearing with the Autorité de la concurrence of 18 October 2019, Adopts the following decision: 3 Summary1 Under this Decision, the Autorité de la concurrence fines Google for abusing its dominant position in the online search advertising market, in violation of Article L. 420-2 of the French Code of Commercial Law (Code de Commerce) and Article 102 of the Treaty on the Functioning of the European Union. This decision follows a complaint by Gibmedia. The investigation carried out led to a Statement of Objections concerning the non-transparent, non-objective and discriminatory application of the rules of Google’s AdWords online search advertising service, renamed Google Ads in July 2018. In the French online search advertising market, Google has a dominant position which, in many respects, presents “extraordinary” characteristics. Its search engine currently accounts for more than 90% of searches conducted in France and its share of the online search advertising market is probably greater than 90%. But above all, this dominance benefits from strong dynamics that make the Google Ads services particularly attractive to advertisers. The vast number of searches conducted using Google’s search engine increases the search engine’s attractiveness to internet users, but also makes the Google Ads services more attractive to advertisers, who need to ensure their ads reach a very large audience. This power of attraction and accumulation, related to the two-sided nature of the Google Ads platform and its ultra-dominant position, guarantees Google’s constant growth. Google defines and publishes the rules associated with the Google Ads advertising service. The rules specify the conditions under which advertisers can run ads on the Google network (the “Rules”). These Rules govern the interactions between internet users and advertisers on the two-sided Google Ads platform. Google’s dominance in the online search advertising market means that it has a special responsibility under competition rules, particularly as regards applying the Rules it has defined and which, de facto, influence advertisers’ business models and regulate the interactions between internet users and advertisers. The advertisers’ position regarding Google’s offer is particularly constrained. They have no other choice than to accept the Rules or to stop using Google Ads’ services, even though these represent almost the only offer on the online search advertising market in France. Some of these Rules are designed to prevent internet users from being exposed to malicious websites that could harm their interests. There is nothing in principle to be criticised about the setting of these Rules. However, the Rules in question must be defined and applied objectively, transparently and without discrimination, in view of both their impact on the activity of the advertisers and the websites and products they promote, and their more general effects on internet users and the whole ecosystem. Any attempt to ascertain the exact scope of each Rule is thwarted by their lack of clarity and the absence, in some cases, of any clear distinction between them, even though there are many of them. The opacity and lack of objectivity of the Rules make it difficult for operators to anticipate the conformity of their advertisements, products and services with the Google Ads Rules. 1This summary is strictly for information purposes. Only the grounds of the decision listed below are binding. 4 They also mean that Google has all the discretion to ensure they are being respected and to modify them. An examination of the conditions of application of the Rules shows that Google has used this discretionary power in a random and unfair manner by treating similar operators differently and by making sudden shifts in position with regard to the same advertisers, increasing the opacity of the Rules. Google has also acted inconsistently towards certain advertisers, aggravating the lack of clarity of the Rules. Google’s sales teams have thus been able to work proactively with some advertisers, offering them “personalised assistance” to develop their sites through the Google Ads services. However, some of the sites approached are sites that were previously suspended for breaching the Rules, particularly those designed to protect internet users. Google’s Rules and their application overstep what would be considered proportionate to the legitimate aim of protecting Google’s consumers. In addition to direct effects on the online search advertising market, this could also potentially harm competition in the downstream markets in which the advertisers operate. The formulation of the Rules and their unfair and discriminatory application are likely to discourage the entry of innovative sites while failing to bar sites that are potentially harmful for consumers.
Recommended publications
  • Economic and Social Impacts of Google Cloud September 2018 Economic and Social Impacts of Google Cloud |
    Economic and social impacts of Google Cloud September 2018 Economic and social impacts of Google Cloud | Contents Executive Summary 03 Introduction 10 Productivity impacts 15 Social and other impacts 29 Barriers to Cloud adoption and use 38 Policy actions to support Cloud adoption 42 Appendix 1. Country Sections 48 Appendix 2. Methodology 105 This final report (the “Final Report”) has been prepared by Deloitte Financial Advisory, S.L.U. (“Deloitte”) for Google in accordance with the contract with them dated 23rd February 2018 (“the Contract”) and on the basis of the scope and limitations set out below. The Final Report has been prepared solely for the purposes of assessment of the economic and social impacts of Google Cloud as set out in the Contract. It should not be used for any other purposes or in any other context, and Deloitte accepts no responsibility for its use in either regard. The Final Report is provided exclusively for Google’s use under the terms of the Contract. No party other than Google is entitled to rely on the Final Report for any purpose whatsoever and Deloitte accepts no responsibility or liability or duty of care to any party other than Google in respect of the Final Report and any of its contents. As set out in the Contract, the scope of our work has been limited by the time, information and explanations made available to us. The information contained in the Final Report has been obtained from Google and third party sources that are clearly referenced in the appropriate sections of the Final Report.
    [Show full text]
  • Security Now! #514 - 06-30-15 Tor’S Astoria Client
    Security Now! #514 - 06-30-15 Tor’s Astoria Client This week on Security Now! ● Abode issues an emergency out-of-cycle patch for FLASH, ● Microsoft updates its root certificate store and ruffles a few feathers, ● An update to Google's Chrome browser unnerves some, ● Samsung's original solution to driver collision, ● An AM radio that steals nearby Crypto keys, ● A truly FABULOUS siteof Privacy tools, ● New evidence that major ISPs are not being net-neutral, ● Managing NoScript, ● Some miscellaneous notes, ● A look at efforts to increase Tor’s privacy. Is that Pita Bread spying on you? Security News Adobe issues emergency (out-of-cycle) FLASH player update ● https://www.fireeye.com/blog/threat-research/2015/06/operation-clandestine-wolf-adobe -flash-zero-day.html ● Operation Clandestine Wolf – Adobe Flash Zero-Day in APT3 Phishing Campaign ● In June, FireEye’s FireEye as a Service team in Singapore uncovered a phishing campaign exploiting an Adobe Flash Player zero-day vulnerability. The attackers’ emails included links to compromised web servers that served either benign content or a malicious Adobe Flash Player file that exploits the vulnerability (CVE-2015-3113). ● CVE-2015-3113: ○ Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015. ● APT3 ○ The China-based threat group FireEye tracks as APT3, aka UPS, is responsible for this exploit and activity.
    [Show full text]
  • VAASAN AMMATTIKORKEAKOULU International Business
    Hoang-Mai Nguyen A FAREWELL TO ADS? On the conflict between online advertisements and adblockers Business Economics 2016 ACKNOWLEDGEMENT My friend Mathieu once told me, “Beautiful places are everywhere, but it is the people that make a place special. Therefore, whenever I travel somewhere, it is not the place that I want to visit; it is the people that I want to meet.” And so I would like to dedicate this thesis to the great friends, teachers, and strangers that I have met during the last four years. Thank you for showing me what it is like to live, care and matter. I am grateful to my supervisor, Satu Lautamäki, for her endless support and en- couragement. Thank you for never giving up on me. Và dĩ nhiên, con cảm ơn bố. Con cảm ơn mẹ. Cảm ơn bố mẹ vì đã đồng ý cho con ra đi và trưởng thành. Summer 2016, Vaasa. Mai. VAASAN AMMATTIKORKEAKOULU International Business TIIVISTELMÄ Tekijä: Hoang-Mai Nguyen Opinnäytetyön nimi Hyvästit mainoksille? Ristiriita verkkomainononnan ja mainoksenestoliitännäisten välillä Vuosi 2016 Kieli Englanti Sivumäärä 68 + 8 Liitettä Ohjaaja Satu Lautamäki Opinnäytetyön tarkoitus on analysoida mainoksenestoliitännäisten vaikutusta verkkomainontateollisuuteen. Päämääränä on (1) selvittää mainoksenestoliitännäisiä käyttävien henkilöiden käyttäjäprofiili, (2) luotettujen sivustojen listaukseen erikoistuneiden tahojen motivaatiot ja (3) tutkia ihmisten halukkuutta luotettujen sivustojen listausliitännäisten käyttöön ja maksettuun sisältöön internetissä. Kattava ymmärrys verkkomainonnan nykytilanteesta kartoitettiin
    [Show full text]
  • Security Now! #615 - 06-06-17 Legacy’S Long Tail
    Security Now! #615 - 06-06-17 Legacy’s Long Tail This week on Security Now! This week we discuss an embarrassing high-profile breach of an online identity company, an over-hyped problem found in Linux's sudo command, the frightening software used by the UK's Trident nuclear missile submarine launch platforms, how emerging nations prevent high school test cheating, another lesson about the danger of SMS authentication codes, another worrisome SHODAN search result, high-penetration dangerous adware from a Chinese marketer, another "that's not a bug" bug in Chrome allowing websites to surreptitiously record audio and video without the user's knowledge, the foreseeable evolution of hybrid crypto-malware, the limp return of Google Contributor, Google continues to work on end-to-end eMail encryption, a follow-up on straight-to-voicemail policy, “homomorphic encryption” (what the heck is that?), and "closing the loop" follow up from recent discussions. Our Picture of the Week Security News OneLogin Breach: ● OneLogin is a single-sign-on provider using OAuth. ● So rather than "sign in with Google" it's "Sign in with OneLogin." ● OneLogin implemented their cloud-based infrastructure using Amazon AWS cloud services. ● Around 9pm PST in the evening last Wednesday, they detected that odd usage patterns had been occurring within their database instances for the previous seven hours. ● They shutdown the unauthorized access and began to look at what had been happening. ● The bottom line is: It doesn't get any worse. ● Many have criticized their public response for being opaque and deliberately lacking in detail because they provided much more information non-publicly via eMail to their subscribers.
    [Show full text]
  • On the Security of Single Sign-On
    On the Security of Single Sign-On Vladislav Mladenov (Place of birth: Pleven/Bulgaria) [email protected] 30th June 2017 Ruhr-University Bochum Horst G¨ortz Institute for IT-Security Chair for Network and Data Security Dissertation zur Erlangung des Grades eines Doktor-Ingenieurs der Fakult¨atf¨urElektrotechnik und Informationstechnik an der Ruhr-Universit¨atBochum First Supervisor: Prof. Dr. rer. nat. J¨org Schwenk Second Supervisor: Prof. Dr.-Ing. Felix Freiling www.nds.rub.de Abstract Single Sign-On (SSO) is a concept of delegated authentication, where an End- User authenticates only once at a central entity called Identity Provider (IdP) and afterwards logs in at multiple Service Providers (SPs) without reauthenti- cation. For this purpose, the IdP issues an authentication token, which is sent to the SP and must be verified. There exist different SSO protocols, which are implemented as open source libraries or integrated in commercial products. Google, Facebook, Microsoft and PayPal belong to the most popular SSO IdPs. This thesis provides a comprehensive security evaluation of the most popular and widely deployed SSO protocols: OpenID Connect, OpenID, and SAML. A starting point for this research is the development of a new concept called malicious IdP, where a maliciously acting IdP is used to attack SSO. Generic attack classes are developed and categorized according to the requirements, goals, and impact. These attack classes are adapted to different SSO proto- cols, which lead to the discovery of security critical vulnerabilities in Software- as-a-Service Cloud Providers, eCommerce products, web-based news portals, Content-Management systems, and open source implementations.
    [Show full text]
  • Paper, We Present a Adblockers
    Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysis Shitong Zhu∗, Xunchao Huy, Zhiyun Qian∗, Zubair Shafiqz and Heng Yin∗ ∗University of California, Riverside Email: [email protected], [email protected], [email protected] ySyracuse University, Email: [email protected] zUniversity of Iowa, Email: zubair-shafi[email protected] Abstract—Millions of people use adblockers to remove in- Millions of users worldwide now use adblockers [51] that trusive and malicious ads as well as protect themselves against are available as browser extensions (e.g., Adblock, Adblock tracking and pervasive surveillance. Online publishers consider Plus, and uBlock) and full-fledged browsers (e.g., Brave and adblockers a major threat to the ad-powered “free” Web. They Cliqz). Even Chrome has now included a built-in adblocker in have started to retaliate against adblockers by employing anti- its experimental version — Chrome Canary [7]. According to adblockers which can detect and stop adblock users. To counter PageFair [26], 11% of the global Internet population is block- this retaliation, adblockers in turn try to detect and filter anti-adblocking scripts. This back and forth has prompted an ing ads as of December 2016. A recent study by comScore [40] escalating arms race between adblockers and anti-adblockers. reported that 18% of Internet users in the United States use adblockers. Moreover, the prevalence of adblockers is much We want to develop a comprehensive understanding of anti- higher for certain locations and demographics. For instance, adblockers, with the ultimate aim of enabling adblockers to approximately half of 18-34 year old males in Germany use bypass state-of-the-art anti-adblockers.
    [Show full text]
  • Understanding Emerging Threats to Online Advertising
    Understanding Emerging Threats to Online Advertising CEREN BUDAK, University of Michigan SHARAD GOEL, Stanford University JUSTIN RAO, Microsoft Research GEORGIOS ZERVAS, Boston University Questrom School of Business Two recent disruptions to the online advertising market are the widespread use of ad-blocking software and proposed restrictions on third-party tracking, trends that are driven largely by consumer concerns over privacy. Both primarily impact display advertising (as opposed to search and native social ads), and affect how retailers reach customers and how content producers earn revenue. It is, however, unclear what the consequences of these trends are. We investigate using anonymized web browsing histories of 14 million individuals, focusing on “retail sessions” in which users visit online sites that sell goods and services. We find that only 3% of retail sessions are initiated by display ads, a figure that is robust to permissive attribution rules and consistent across widely varying market segments. We further estimate the full distribution of how retail sessions are initiated, and find that search advertising is three times more important than display advertising to retailers, and search advertising is itself roughly three times less important than organic web search. Moving to content providers, we find that display ads are shown by 12% of websites, accounting for 32% of their page views; this reliance is concentrated in online publishing (e.g., news outlets) where the rate is 91%. While most consumption is either in the long-tail of websites that do not show ads, or sites like Facebook that show native, first-party ads, moderately sized web publishers account for a substantial fraction of consumption, and we argue that they will be most affected by changes in the display advertising market.
    [Show full text]
  • PRIVACY in ONLINE ADVERTISING PLATFORMS a Dissertation
    PRIVACY IN ONLINE ADVERTISING PLATFORMS a dissertation submitted to the department of telematics engineering and the committee on graduate studies of universitat politecnica` de catalunya in partial fulfillment of the requirements for the degree of doctor of philosophy Jos´eAntonio Estrada Jim´enez July 2020 c Copyright by Jos´eAntonio Estrada Jim´enez2020 All Rights Reserved ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Jordi Forn´eMu~noz) Principal Co-Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Javier Parra Arnau) Principal Co-Adviser Approved for the University Committee on Graduate Studies. iii iv A A. A. v Abstract Online advertising is consistently considered as the pillar of the \free" content on the Web. By giving websites a way of financing their operation, advertising would be preventing users from being charged for the content consumed on the Web. Besides promoting content creation, this revolution of the marketing business created a myriad of new opportunities for advertisers to reach potential customers at the right time. Furthermore, the option of delivering personalized ads has turned advertising into a service that can be really valuable for end users, who thank receiving ads tailored to their interests. Given its apparent success in getting paying customers, online advertising is fueling a billionaire business in which the largest tech companies are involved.
    [Show full text]
  • Affective Capitalism of Knowing and the Society of Search Engine
    Preprint of Huvila, I. (2016). Affective capitalism of knowing and the society of search engine. Aslib Journal of Information Management, 68(5), 566-588. Affective capitalism of knowing and the society of search engine Isto Huvila Uppsala University [email protected] Abstract Purpose: This article discusses the affective premises and economics of the influence of search engines on knowing and informing in the contemporary society. Design/methodology/approach: A conceptual discussion of affective the premises and framings of the capitalist economics of knowing is presented. Findings: The main proposition of this text is that the exploitation of affects is entwined in the competing market and emancipatory discourses and counter- discourses both as intentional interventions, and perhaps even more significantly, as unintentional influences that shape the ways of knowing in the peripheries of the regime that shape cultural constellations of their own. Affective capitalism bounds and frames our ways of knowing in ways that are difficult to anticipate and read even from the context of the regime itself. Originality/value: In the relatively extensive discussion on the role of affects in the contemporary capitalism, influence of affects on knowing and their relation to search engine use has received little explicit attention so far. 1 Introduction Affect makes us not only to act and to work, but also to think about things and know in particular ways. Emotions and passion fuel curiosity (Gherardi et al., 2007) but also function as a source of aesthetic and experiential knowledge (Gagliardi, 2007) and a driver of understanding the world (Knorr-Cetina, 1997). Even if we try to be seemingly rational in how we make decisions, decide what information is good and what we know of things, we are only seldom fully informed to make rational decisions (Hardin, 2009) and even if we would have good information, we often go on emotions.
    [Show full text]
  • The Nuts and Bolts of Micropayments
    The Nuts and Bolts of Micropayments: a Survey Syed Taha Ali Dylan Clarke Patrick McCorry NUST School of Electrical Engineering Newcastle University University College London and Computer Science, Pakistan United Kingdom United Kingdom Email: [email protected] Email: [email protected] Email: [email protected] Abstract—We are witnessing a veritable explosion of interest in with direct and immediate applications in reviving journalism new electronic payments systems and modalities, such as digital [3] and supporting the music industry [4]. The ability to wallets, mobile and contactless payments, and cryptocurrencies economically transfer minuscule amounts of money at high such as Bitcoin. One area of research and commercial inter- est at the confluence of these trends, which is also receiving speeds will empower dynamic new pricing models where dig- reinvigorated attention, is micropayments. Indeed, a workable ital content such as online newspapers, magazines, and music micropayments system, one that lets users purchase digital albums can be unbundled, allowing consumers to purchase content in an easy and “hassle-free” manner with payments in individual news stories, articles, and songs. Furthermore, with the order of cents and lower, has long been regarded as the holy pricing in the sub-dollar range, users will be encouraged grail of web-publishing. The research community has actively worked on this problem over the past two decades, numerous to increase spending and also engage in impulse purchases, creative solutions have been presented, business ventures have thereby opening up powerful new revenue streams. been launched, but a mainstream solution has yet to emerge. There have been two main waves of innovation in designing In this paper, we undertake a comprehensive survey of key and deploying micropayment systems, the first in the late trends and innovations in the development of research-based 1990s and the second in the 2000s [5] [6].
    [Show full text]
  • Signature Redacted
    Tipsy MASSACHUSETTS INSTITUTE OF TECHNOLOGY by Philippe Schiff AUG 2 0 2015 S.B., E.E.C.S. M.I.T., 2014 LIBRARIES ARCHIVES Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Electrical Engineering and Computer Science at the Massachusetts Institute of Technology June 2015 The author hereby grants to M.I.T. permission to reproduce and to distribute publicly paper and electronic copies of this thesis document in whole and in part in any medium now known or hereafter created. Author: Department of Electrical Engineering and Computer Science June 5, 201 - redacted Certified by: Signature Department of Electrical Engineering and Computer Science June 5, 2015 e ; Accepted by: Prof. Albert R. Meyer, Chairman, Masters of Engineering Thesis Committee Tipsy by Philippe Schiff Submitted to the Department of Electrical Engineering and Computer Science June 5, 2015 In Partial Fulfillment of the Requirements for the Degree of Master of Engineering in Electrical Engineering and Computer Science Abstract In this document I describe Tipsy. Today's models for paying online content creators are inadequate. With Tipsy, the idea of Voluntary Microdonations is revisited and modified to overcome the obstacles of previous and current attempts. I implemented a Google Chrome browser extension that logs a user's content consumption online and stores the information locally. Tipsy does not require any user input to decide which content is of particular interest to the user. Instead, Tipsy suggests a payment based on the user's browsing time. Tipsy reminds the user to pay and suggests a dollar amount.
    [Show full text]
  • V3.2.0.1 Grr
    GRR Documentation Release GRR team Nov 29, 2017 Contents 1 Contacts 3 2 Table of contents 5 i ii GRR Documentation, Release GRR Rapid Response is an incident response framework focused on remote live forensics. It consists of a python client (agent) that is installed on target systems, and python server infrastructure that can manage and talk to clients. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR is open source (Apache License 2.0) and is developed on GitHub: github.com/google/grr Contents 1 GRR Documentation, Release 2 Contents CHAPTER 1 Contacts • GitHub issues: github.com/google/grr/issues • GRR Users mailing list: grr-users • Follow us on twitter for announcements of GRR user meetups. We use a gitter chat room during meetups. 3 GRR Documentation, Release 4 Chapter 1. Contacts CHAPTER 2 Table of contents 2.1 What is GRR? GRR Rapid Response is an incident response framework focused on remote live forensics. The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely. GRR consists of 2 parts: client and server. GRR client is deployed on systems that one might want to investigate. On every such system, once deployed, GRR client periodically polls GRR frontend servers for work. “Work” means running a specific action: downloading file, listing a directory, etc. GRR server infrastructure consists of several components (frontends, workers, UI servers) and provides web-based graphical user interface and an API endpoint that allows analysts to schedule actions on clients and view and process collected data.
    [Show full text]