Long-Term Observation on Browser Fingerprinting: Users' Trackability

Total Page:16

File Type:pdf, Size:1020Kb

Long-Term Observation on Browser Fingerprinting: Users' Trackability Proceedings on Privacy Enhancing Technologies ; 2020 (2):558–577 Gaston Pugliese*, Christian Riess, Freya Gassmann, and Zinaida Benenson Long-Term Observation on Browser Fingerprinting: Users’ Trackability and Perspective Abstract: Browser fingerprinting as a tracking technique plugins, were sufficient to uniquely recognize between to recognize users based on their browsers’ unique fea- 83.6% and 94.2% of browsers in his dataset. tures or behavior has been known for more than a Motivation. The collected browser fingerprints of decade. We present the results of a 3-year online study Panopticlick have not been published. Ten years later, on browser fingerprinting with more than 1,300 users. after many related studies [2–6], research on browser This is the first study with ground truth on user level, fingerprinting still lacks available and appropriate data. which allows the assessment of trackability based on Depending on the investigated aspects of browser finger- fingerprints of multiple browsers and devices per user. printing, the requirements for data collection are quite Based on our longitudinal observations of 88,000 mea- extensive: long-term, large-scale, fine-grained, diversi- surements with over 300 considered browser features, fied, sometimes cross-browser and cross-device. These we optimized feature sets for mobile and desktop de- requirements apply to research studying the evolution vices. Further, we conducted two user surveys to deter- of browser features over time, assessing users’ trackabil- mine the representativeness of our user sample based on ity, or examining the effectiveness of countermeasures. users’ demographics and technical background, and to At the time of writing, we are aware of only two learn how users perceive browser fingerprinting and how available datasets of browser fingerprints. Tillmann col- they protect themselves. lected fingerprints in 2012 [2] and published a dataset that does not contain raw values of the most discrimi- Keywords: browser fingerprinting, tracking, privacy nating features, like fonts or plugins, and the data col- DOI 10.2478/popets-2020-0041 lection was performed over a short period of one month. Received 2019-08-31; revised 2019-12-15; accepted 2019-12-16. Vastel et al. published an unfiltered sample of their data in 2018 of fingerprints collected via browser ex- tensions [3]. Although the dataset contains fingerprints 1 Introduction from 1.5 years, it lacks mobile devices, other browser families than Firefox and Chrome (after filtering) as well In 2020, the PETS paper How Unique Is Your Web as precise timestamps and frequencies of observations. Browser? [1] by Peter Eckersley will celebrate its 10th Furthermore, most studies relied on cookies to rec- publication anniversary. It was the first paper describ- ognize recurring browsers [1, 2, 4, 6]. This, however, ing a study on browser fingerprinting (Panopticlick) is not a reliable way to establish ground truth for long- that gained far-reaching attention and can thus be seen term observations, especially for privacy studies with al- as the origin of this research field. Back then, Eckersley legedly savvy users: cookies can be easily deleted, either showed that a small set of eight browser characteristics, manually by the user or automatically by the browser, including the user-agent string and the list of installed and they do not help to recognize users if they switch browsers or devices. Moreover, it diminishes the relia- bility of ground truth on fingerprints being unique-by- entity and trackable (Sec. 2.2). *Corresponding Author: Gaston Pugliese: Friedrich- Alexander University Erlangen-Nürnberg, E-mail address: In general, both the overall long-term trackability of [email protected] users across multiple browsers and devices, and users’ Christian Riess: Friedrich-Alexander University Erlangen- understanding of or actions against browser fingerprint- Nürnberg, E-mail address: [email protected] ing have received little attention so far. Furthermore, Freya Gassmann: Saarland University, E-mail address: the representativeness of fingerprint datasets has only [email protected] Zinaida Benenson: Friedrich-Alexander University Erlangen- been investigated with respect to technical aspects [1– Nürnberg, E-mail address: [email protected] 8], but not with respect to user demographics. Long-Term Observation on Browser Fingerprinting 559 Define Finally, the impact of participation in the studies on Collect browser features browser features users’ perception of fingerprinting remains unknown. to collect Research Questions. Based on the considerations above, we present a 3-year online study with the goals Preprocess Feature to collect longitudinal fingerprint data and to investi- browser features stemming gate the users’ perspective on browser fingerprinting for the first time. Our data collection (Sec. 3) estab- Fingerprint Compose Feature set lishes ground truth on user level instead of browser or linkability fingerprints optimization device level. Thereby, we can link fingerprints to indi- vidual study participants over longer periods of time Evaluate without relying on the persistence of client-side identi- fingerprint metrics fiers and regardless of the number of devices or browsers they used. Furthermore, we conducted two user surveys Fig. 1. Systemized workflow for browser fingerprinting to determine the demographic representativeness of our user sample and to understand the users’ perception of 3. We present a simple, yet effective approach for op- browser fingerprinting, the role of their study participa- timizing feature sets towards different metrics (e.g., tion on this perception, and their protection measures. stability of fingerprints) for desktop and mobile de- We aim to answer the following research questions: vices. Further, we introduce feature stemming as a – RQ1: How trackable are users based on their way to improve feature stability, e.g., by stripping browser fingerprints regardless of the number of off version substrings (Sec. 4). browsers and devices in use? 4. We make a dataset of our long-term study available – RQ2: How do different feature sets perform regard- for research purposes (Sec. 7). ing fingerprint stability and trackability of users? – RQ3: Do demographics of users, as well as their technical background, privacy concerns and privacy behavior, correlate with their trackability? 2 Background – RQ4: How do users perceive browser fingerprinting, what is the role of study participation in this per- A fingerprint is “a set of information elements that ception, and which countermeasures do they apply? identifies a device or application instance” and finger- Hypotheses. For RQ3, we formulate the follow- printing is the “process of uniquely identifying” these ing six hypotheses, here combined into one sentence for entities [9]. For browser fingerprinting, these informa- brevity. H1-6: The following user characteristics are re- tion elements (features) can be obtained passively from lated to their trackability: (1) age, (2) gender, (3) educa- the client HTTP headers (e.g., user-agent string or lan- tion level, (4) computer science background, (5) privacy guage), and actively using a client-side script to col- behavior, (6) privacy concerns. lect information like screen resolution or plugins. Un- Contributions. The main contributions of this pa- like cookies which are stateful identifiers stored on the per cover technical findings as well as insights in users’ client side, fingerprinting is considered a stateless track- perception of browser fingerprinting based on quantita- ing technique [10]. tive and qualitative analyses: In the following, we review concepts and termi- 1. We present a novel long-term study on browser nology of browser fingerprinting, and we provide an fingerprinting with ground truth on user level. overview of studies that collected browser fingerprint- Between 2016–2019, we collected 88,088 measure- ing data since 2009 (Table 1). ments of 305 browser features of 1,304 participants (Sec. 3). 2. We present two online surveys with study partic- 2.1 Evaluating Browser Fingerprints ipants to assess their demographic characteristics and thus the representativeness of our sample as Figure 1 shows a workflow for browser fingerprinting: well as to study participants’ privacy behavior, com- (1) The browser features that shall be collected are de- prehension of browser fingerprinting, and applied fined and the fingerprint script is implemented for the countermeasures (Sec. 3.2, 5, and 6). client and server side. (2) The fingerprint script is de- ployed to collect the clients’ browser features. If ap- Long-Term Observation on Browser Fingerprinting 560 plicable, these features are enriched with further state- Def. 1. A fingerprint f(e, t) w.r.t. T is unique-by- ful identifiers (e.g., cookies, session ID after authenti- entity if, and only if, it is linked to a single entity, i.e., cation, personalized token in URL). Depending on the 0 0 0 0 0 type of ground truth, a fingerprint can be linked to ei- ∀e ∈ E, ∀t ∈ T, e 6= e ⇒ f(e , t ) 6= f(e, t) . (5) ther an individual browser instance, device, or even user. (3) The collected browser features are preprocessed Def. 2. A fingerprint f(e, t) w.r.t. T is unique-by- which may include normalization (e.g., screen resolu- appearance if, and only if, it was observed once, i.e., tion [8]) or derivation of additional information (e.g., ∀e0 ∈ E, ∀t0 ∈ T, f(e0, t0) = f(e, t) ⇒ e0 = e ∧ t0 = t. (6) user-agent parsing). Our work contributes to this step of the workflow and proposes feature stemming and fea- Def. 3. A fingerprint f(e, t) is stable if, and only if, ture set optimization to improve the stability of features its stability period is > 0. and to compile an optimized feature set from collected features (Sec. 4). (4) The actual fingerprints are com- Def. 4. A fingerprint f(e, t) is trackable if, and only posed using a feature set. In practice, fingerprints can if, f(e, t) is (i) unique-by-entity and (ii) stable. be handled as MD5 hashes, or as vectors of raw feature values.
Recommended publications
  • Private Browsing
    Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University https://www.usenix.org/conference/soups2018/presentation/habib-prying This paper is included in the Proceedings of the Fourteenth Symposium on Usable Privacy and Security. August 12–14, 2018 • Baltimore, MD, USA ISBN 978-1-939133-10-6 Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University {htq, jcolnago, vidyag, spearman, thomasjm, acquisti, nicolasc, lorrie}@andrew.cmu.edu ABSTRACT Prior user studies have examined different aspects of private Previous research has suggested that people use the private browsing, including contexts for using private browsing [4, browsing mode of their web browsers to conduct privacy- 10, 16, 28, 41], general misconceptions of how private brows- sensitive activities online, but have misconceptions about ing technically functions and the protections it offers [10,16], how it works and are likely to overestimate the protections and usability issues with private browsing interfaces [41,44]. it provides. To better understand how private browsing is A major limitation of much prior work is that it is based used and whether users are at risk, we analyzed browsing on self-reported survey data, which may not always be reli- data collected from over 450 participants of the Security able.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • Forensic Investigation of User's Web Activity on Google Chrome Using
    IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.9, September 2016 123 Forensic Investigation of User’s Web Activity on Google Chrome using various Forensic Tools Narmeen Shafqat, NUST, Pakistan Summary acknowledged browsers like Internet Explorer, Google Cyber Crimes are increasing day by day, ranging from Chrome, Mozilla Firefox, Safari, Opera etc. but should confidentiality violation to identity theft and much more. The also have hands on experience of less popular web web activity of the suspect, whether carried out on computer or browsers like Erwise, Arena, Cello, Netscape, iCab, smart device, is hence of particular interest to the forensics Cyberdog etc. Not only this, the forensic experts should investigator. Browser forensics i.e forensics of suspect’s browser also know how to find artifacts of interest from older history, saved passwords, cache, recent tabs opened etc. , therefore supply ample amount of information to the forensic versions of well-known web browsers; Internet Explorer, experts in case of any illegal involvement of the culprit in any Chrome and Mozilla Firefox atleast, because he might activity done on web browsers. Owing to the growing popularity experience a case where the suspected person is using and widespread use of the Google Chrome web browser, this older versions of these browsers. paper will forensically analyse the said browser in windows 8 According to StatCounter Global market share for the web environment, using various forensics tools and techniques, with browsers (2015), Google Chrome, Mozilla Firefox and the aim to reconstruct the web browsing activities of the suspect. Microsoft’s Internet Explorer make up 90% of the browser The working of Google Chrome in regular mode, private usage.
    [Show full text]
  • Incognito (Private Browsing) for AHA Online Testing
    Incognito (private browsing) for AHA Online Testing Go Incognito on Google Chrome 1. Open Google Chrome and click the wrench icon in the top right corner. 2. Click ‘new incognito window’. 3. Alternatively, you can press Ctrl + Shift + N. *You can also open a link in a web page in Incognito Mode. 1. Right-click on the link you want to open in an Incognito window. 2. Click ’Open in new incognito window’ from the context menu. **You can tell if you’re browsing privately by looking for the logo of the person in disguise in the top-left corner of the window. He’s wearing sunglasses, a hat and a raincoat. Go Incognito on Mozilla Firefox 1. Open Firefox and click the hamburger Menu button – it looks like three parallel lines. 2. Click ‘New private window’. *You can also open a link in a web page in a private window. 1. Right-click on the link you want to open in a private window. 2. Click ’Open in New Private Window’ from the context menu. **You can tell if you’re browsing privately by looking for an icon of a purple mask in the top-right corner of the window. Go Incognito on Safari on the Mac 1. In Yosemite and later, open Safari and click on ‘File’. 2. Click ‘New Private Window’. 3. Alternatively, click Command + Shift + N. 4. In Mavericks 10.9 or older, open Safari and click Safari in the browser’s Menu bar and select ‘Private Browsing’. **Private browsing tabs in Safari are separated from non-private tabs.
    [Show full text]
  • An Analysis of Private Browsing Modes in Modern Browsers
    An Analysis of Private Browsing Modes in Modern Browsers Gaurav Aggarwal Elie Bursztein Collin Jackson Dan Boneh Stanford University CMU Stanford University Abstract Even within a single browser there are inconsistencies. We study the security and privacy of private browsing For example, in Firefox 3.6, cookies set in public mode modes recently added to all major browsers. We first pro- are not available to the web site while the browser is in pose a clean definition of the goals of private browsing private mode. However, passwords and SSL client cer- and survey its implementation in different browsers. We tificates stored in public mode are available while in pri- conduct a measurement study to determine how often it is vate mode. Since web sites can use the password man- used and on what categories of sites. Our results suggest ager as a crude cookie mechanism, the password policy that private browsing is used differently from how it is is inconsistent with the cookie policy. marketed. We then describe an automated technique for Browser plug-ins and extensions add considerable testing the security of private browsing modes and report complexity to private browsing. Even if a browser ad- on a few weaknesses found in the Firefox browser. Fi- equately implements private browsing, an extension can nally, we show that many popular browser extensions and completely undermine its privacy guarantees. In Sec- plugins undermine the security of private browsing. We tion 6.1 we show that many widely used extensions un- propose and experiment with a workable policy that lets dermine the goals of private browsing.
    [Show full text]
  • Features Guide [email protected] Table of Contents
    Features Guide [email protected] Table of Contents About Us .................................................................................. 3 Make Firefox Yours ............................................................... 4 Privacy and Security ...........................................................10 The Web is the Platform ...................................................11 Developer Tools ..................................................................13 2 About Us About Mozilla Mozilla is a global community with a mission to put the power of the Web in people’s hands. As a nonprofit organization, Mozilla has been a pioneer and advocate for the Web for more than 15 years and is focused on creating open standards that enable innovation and advance the Web as a platform for all. We are committed to delivering choice and control in products that people love and can take across multiple platforms and devices. For more information, visit www.mozilla.org. About Firefox Firefox is the trusted Web browser of choice for half a billion people around the world. At Mozilla, we design Firefox for how you use the Web. We make Firefox completely customizable so you can be in control of creating your best Web experience. Firefox has a streamlined and extremely intuitive design to let you focus on any content, app or website - a perfect balance of simplicity and power. Firefox makes it easy to use the Web the way you want and offers leading privacy and security features to help keep you safe and protect your privacy online. Mozilla continues to move the Web forward by pioneering new open source technologies such as asm.js, Emscripten and WebAPIs. Firefox also has a range of amazing built-in developer tools to provide a friction-free environment for building Web apps and Web content.
    [Show full text]
  • Online Tracking: a 1-Million-Site Measurement and Analysis
    Online Tracking: A 1-million-site Measurement and Analysis Steven Englehardt Arvind Narayanan Princeton University Princeton University This is an extended version of our paper that appeared at ACM CCS 2016. ABSTRACT to resort to a stripped-down browser [31] (a limitation we explore in detail in Section 3.3). (2) We provide compre­ We present the largest and most detailed measurement of hensive instrumentation by expanding on the rich browser online tracking conducted to date, based on a crawl of the extension instrumentation of FourthParty [33], without re­ top 1 million websites. We make 15 types of measurements quiring the researcher to write their own automation code. on each site, including stateful (cookie-based) and stateless (3) We reduce duplication of work by providing a modular (fingerprinting-based) tracking, the effect of browser privacy architecture to enable code re-use between studies. tools, and the exchange of tracking data between different Solving these problems is hard because the web is not de­ sites (“cookie syncing”). Our findings include multiple so­ 2 signed for automation or instrumentation. Selenium, the phisticated fingerprinting techniques never before measured main tool for automated browsing through a full-fledged in the wild. browser, is intended for developers to test their own web­ This measurement is made possible by our open-source 1 sites. As a result it performs poorly on websites not con­ web privacy measurement tool, OpenWPM , which uses an trolled by the user and breaks frequently if used for large- automated version of a full-fledged consumer browser. It scale measurements. Browsers themselves tend to suffer supports parallelism for speed and scale, automatic recovery memory leaks over long sessions.
    [Show full text]
  • Private Browsing
    MyChart Troubleshooting Guide Private Browsing Private Browsing helps prevent your browsing history, temporary Internet files, form data, cookies, and user names and passwords from being retained by the browser. This functionality is a good idea to use on a public/shared computer but it can also help isolate your browser and ensure that installed plugins or add-ons can’t interfere with the user’s browser session. Internet Explorer – Directions to turn on: InPrivate Browsing http://windows.microsoft.com/en-us/windows/inprivate-faq#1TC=windows-7 To turn on InPrivate Browsing, complete the following steps: Double click on the Internet Explorer icon to open a new browsing session. Click the Tools icon ; click Safety, then click InPrivate Browsing. Open a new Internet tab by clicking this icon . You should now see an InPrivate indicator next to the URL bar. Any website that you enter in the URL bar will be InPrivate mode. Mozilla Firefox – Directions to turn on: Private Browsing https://support.mozilla.org/en-US/kb/private-browsing-browse-web-without-saving-info To turn on Private Browsing, do any of the following: Double click on the Mozilla Firefox icon to open a new browsing session. Click the menu button and then click on New Private Window. Open a new Internet tab by clicking this icon . You should now see a Private Browsing indicator next to the URL bar. Any website that you enter in the URL bar will be in Private Browsing mode. Google Chrome – Directions to turn on: Incognito Mode https://support.google.com/chrome/answer/95464?hl=en To turn on incognito mode, do any of the following: Double click on the Google Chrome icon to open a new browsing session.
    [Show full text]
  • RFC 8828: Webrtc IP Address Handling Requirements
    Stream: Internet Engineering Task Force (IETF) RFC: 8828 Category: Standards Track Published: January 2021 ISSN: 2070-1721 Authors: J. Uberti G. Shieh Google RFC 8828 WebRTC IP Address Handling Requirements Abstract This document provides information and requirements for how IP addresses should be handled by Web Real-Time Communication (WebRTC) implementations. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at https://www.rfc-editor.org/info/rfc8828. Copyright Notice Copyright (c) 2021 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Uberti & Shieh Standards Track Page 1 RFC 8828 WebRTC IP Handling January 2021 Table of Contents 1.
    [Show full text]
  • How to Go Incognito in All Web Browsers
    5/25/2018 How to go incognito in all web browsers (Chrome, Firefox, Opera, Edge, Internet Explorer) | Digital Citizen <HTTPS://WWW.DIGITALCITIZEN.LIFE/> How to go incognito in all web browsers (Chrome, Firefox, Opera, Edge, Internet Explorer) TUTORIAL by Ciprian Adrian Rusen <https://www.digitalcitizen.life/users/ciprian-adrian-rusen> published on 11/22/2017 A useful tool that any decent web browser offers is private browsing. This feature has a different name, depending on the browser that you are using. Google Chrome calls it Incognito, Internet Explorer and Microsoft Edge name it InPrivate, Firefox calls it Private Browsing with Tracking Protection, while Opera names it Private browsing. In this article we show you how to enable private browsing in all the major web browsers and how to check if you are browsing privately or not: About InPrivate, Incognito or Private Browsing - What is this mode of browsing the web? This feature mostly does the same thing: allows users to browse the web without saving data like cache, history, passwords or cookies. However, this is done locally, meaning that only people using your computer will not be able to find out what websites you have visited. The websites you visited, your ISP (Internet Service Provider) and, in fact, every server your requests pass through, know what you visited. However, some browsers offer more features for their private browsing mode. For example, Opera allows you to enable VPN when browsing privately, so that your ISP cannot track the websites that you visit. Another positive example is Firefox, which blocks trackers from collecting information about your browsing behavior.
    [Show full text]
  • Internet Privacy Implications Research and Draft
    Internet Privacy Implications A Major Qualifying Project Worcester Polytechnic Institute Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science. Submitted By: Goncharova, Masha Harnois, Jeffrey Advisors: Wills, Craig PhD Doyle, James PhD May 6, 2021 Abstract Our research focused on understanding the effectiveness of browsers, extensions, mobile applications, and search engines and their protection of user privacy. We ran test cases on the top 100 Alexa sites, using a Fiddler proxy to capture traffic, with certain configurations of tools mentioned to see which ones were efficient in blocking user tracking technologies. We found that Brave and Firefox in Strict mode are the best browsers in terms of tradeoff between percent of websites with degradation versus percent trackers remaining. uBlock Origin, Ghostery and Privacy Badger are the best browser extensions in terms of the same tradeoff. Based on our results, we created a recommendation system using a survey approach. We suggest a combination of tools that are personalized to users based on their reported privacy preferences and desire to switch their current browsing setup. In order to better understand users’ views on privacy, we additionally showed participants their own data Google has synthesized about them to evaluate if that would change their responses. A ceiling effect appeared in our responses, indicating that no matter the condition, all our participants indicated a willingness to switch to the tools that we were recommending. 1 Table of Contents Abstract 1 Table of Contents 2 List of Tables 6 List of Figures 7 Double Major Note 9 1.
    [Show full text]
  • Symantec Encryption Desktop 10.5 for Macos User Guide
    Symantec Encryption Desktop for macOS User Guide 10.5 Last updated: July 2020 Copyright statement Broadcom, the pulse logo, Connecting everything, and Symantec are among the trademarks of Broadcom. Copyright© 2020 Broadcom. All Rights Reserved. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Contents About Symantec Encryption Desktop 10.5 for macOS 7 What's New in Symantec Encryption Desktop 10.5 for macOS 7 Using this Guide 7 “Managed” versus “Unmanaged” Users 8 Conventions Used in This Guide 8 Who Should Read This Document 9 About Symantec Encryption Desktop Licensing 9 About Symantec Encryption Desktop Licensing 9 Checking License Details 10 If Your License Has Expired 11 Technical Support 11 Symantec Encryption Desktop Basics 15 Symantec Encryption Desktop Terminology 15 Product Components 15 Terms Used in Symantec Encryption Desktop 16 Conventional and Public Key Cryptography 18 Using Symantec Encryption Desktop for the First Time 19 Installing Symantec Encryption Desktop 23 Installing
    [Show full text]