Universidade Federal Do Rio Grande Do Norte

Total Page:16

File Type:pdf, Size:1020Kb

Universidade Federal Do Rio Grande Do Norte UNIVERSIDADE FEDERAL DO RIO GRANDE DO NORTE CENTRO DE CIÊNCIAS HUMANAS, LETRAS E ARTES PROGRAMA DE PÓS-GRADUAÇÃO EM CIÊNCIAS SOCIAIS MARIA RITA PEREIRA XAVIER O DISPOSITIVO DE VIGILÂNCIA ALGORÍTMICA: algoritmos rastreadores, smartphones e coleta de dados NATAL-RN 2021 MARIA RITA PEREIRA XAVIER O DISPOSITIVO DE VIGILÂNCIA ALGORÍTMICA: algoritmos rastreadores, smartphones e coleta de dados Tese de doutorado apresentada ao Programa de Pós- Graduação em Ciências Sociais da Universidade Federal do Rio Grande do Norte, como requisito parcial à obtenção do título de Doutor, sob a orientação da Prof. Dr. Alexsandro Galeno Araújo Dantas. NATAL-RN 2021 Universidade Federal do Rio Grande do Norte - UFRN Sistema de Bibliotecas - SISBI Catalogação de Publicação na Fonte. UFRN - Biblioteca Setorial do Centro de Ciências Humanas, Letras e Artes - CCHLA Xavier, Maria Rita Pereira. O dispositivo de vigilância algorítmica: algoritmos rastreadores, smartphones e coleta de dados / Maria Rita Pereira Xavier. - 2021. 143f.: il. Tese (doutorado) - Centro de Ciências Humanas, Letras e Artes, Programa de pós-graduação em Ciências Sociais, Universidade Federal do Rio Grande do Norte, Natal, RN, 2021. Orientador: Prof. Dr. Alexsandro Galeno Araújo Dantas. 1. Dispositivo - Tese. 2. Algoritmos - Tese. 3. Smartphones - Tese. 4. Rastreadores - Tese. 5. Vigilância - Tese. I. Dantas, Alexsandro Galeno Araújo. II. Título. RN/UF/BS-CCHLA CDU 316 Elaborado por Ana Luísa Lincka de Sousa - CRB-15/748 MARIA RITA PEREIRA XAVIER O DISPOSITIVO DE VIGILÂNCIA ALGORÍTMICA: algoritmos rastreadores, smartphones e coleta de dados Tese de doutorado apresentada ao Programa de Pós- Graduação em Ciências Sociais da Universidade Federal do Rio Grande do Norte, como requisito parcial à obtenção do título de Doutor, sob a orientação da Prof. Dr. Alexsandro Galeno Araújo Dantas. Aprovado em: 26/02/2021 BANCA EXAMINADORA Prof. Dr. Alexsandro Galeno Araújo Dantas – PGCS/UFRN Orientador Profa. Dra. Josimey Costa da Silva – PGCS//UFRN Examinador interno Prof. Dr. Lucas Fortunato Rêgo de Medeiros – PGCS/UFRN Examinador interno Dr. Thiago Tavares das Neves Examinador externo Profa. Dra. Eloísa Joseane da Cunha Klein – UNIPAMPA Examinador externo Refusing to pull back from the world. (Donna Tartt) AGRADECIMENTOS Ao longo dos últimos 5 anos percebi que um doutorado é mais que o título, na verdade, é uma fase que muitas vezes te põe a prova, testa sua capacidade de resistir, de superar seus medos e de compreender suas limitações. Aprendi que uma tese requer muitas mãos, mas que nem sempre são pra escrever. A maioria serve pra apoiar a sua queda, pra te empurrar pros desafios e pra aplaudir quando você consegue. E eu não teria conseguido sem esse apoio. Primeiramente, preciso agradecer aos meus pais, Conceição e Pedro, que desde cedo perceberam minha aptidão pra leitura e nunca deixaram de incentivar isso. Obrigada pelo esforço pra possibilitar que eu chegasse a uma Universidade Federal e mais ainda pela orgulho que vocês demonstram pelas minhas escolhas, isso importa muito. Agradeço também aos meus irmãos, Mariaclara e Matheus, obrigada pela companhia de vida. Aos meus tios, Antônio Balbino e Arlete, que sempre acreditaram no meu potencial, que me proporcionaram estudar outro idioma e que com isso abriram tantas portas pra mim. Ao meu companheiro, Luiz Eduardo Carneiro, que enxugou minhas lágrimas nos dias ruins, me incentivou a superar muitos medos e comemorou comigo cada ínfima vitória. A sua presença faz toda a diferença na minha vida. Aos meus sogros, Luiz e Glauciana, que me deram muito suporte emocional e financeiro durante os últimos anos. A vocês sou, de fato, muito grata. Agradeço à Universidade Federal do Rio Grande do Norte, que foi minha 2ª casa nos últimos 15 anos. Aos professores, servidores e colegas, esse lugar muda vidas, mudou a minha. Por fim, agradeço ao meu orientador, Alex Galeno. Que, nos últimos 10 anos, acreditou no meu potencial, teve paciência pra me ensinar e acompanhou todo o meu crescimento. Muito obrigada por tudo, Alex. Você é um professor excepcional, sorte dos alunos que te encontram pelo caminho. RESUMO O objetivo desta pesquisa de doutorado é analisar o uso de algoritmos rastreadores através de smartphones como uma forma corporativa/empresarial de vigilância. A proposta é se utilizar do conceito de dispositivo (FOUCAULT, 1996; 2008b; 2014; 2018; DELEUZE, 1996; AGAMBEN, 2009) para explicitar como se dá a formação e atuação de um “dispositivo de vigilância algorítmica”. O entendimento é o de que o capitalismo prepararia o terreno para a modulação de subjetividades específicas através da praticidade e do entretenimento proporcionado pelos aparatos tecnológicos, que estariam inseridos em um dispositivo mais abrangente de uma vigilância. O papel do smartphone seria o de abrir caminho para a anuência da entrega de dados apoiada tanto na cooperação voluntária dos usuários quanto no uso de algoritmos rastreadores de dados numa prática conhecida como tracking. A pesquisa bibliográfica é a principal metodologia empregada, as categorias de pesquisa são baseadas no conceito de dispositivo foucaultiano, de forma que esse conceito é utilizado como o próprio método para a delimitação dos componentes do dispositivo algorítmico; consequentemente, este autor é a principal referência teórica utilizada (Foucault, 1996; 2008b; 2014; 2018). Todavia, a perspectiva teórica de Bruno (2013); Bauman e Lyon (2013); Lazzarato (2014; 2006); e Deleuze (1988; 2000) também se fazem amplamente presente. O argumento deste trabalho é o de que a sociedade disciplinar foucaultiana não foi de todo substituída pela sociedade de controle, muito menos seus dispositivos de vigilância foram extintos, mas sim que esses dispositivos assumiram novas formas através do amplo espectro de modulação adquirido pelos aparatos tecnológicos comunicacionais. Palavras-chave: Dispositivo; Rastreadores, Smartphones; Algoritmos; Vigilância. ABSTRACT The purpose of this doctoral research is to analyze the use of tracking algorithms through smartphones as a corporate/corporate form of surveillance. The proposal is to use the concept of device (FOUCAULT, 1996; 2008b; 2014; 2018; DELEUZE, 1996; AGAMBEN, 2009) to explain how the formation and performance of an "algorithmic surveillance device" takes place. The understanding is that capitalism would prepare the ground for the modulation of specific subjectivities through the practicality and entertainment provided by technological devices, which would be inserted in a more comprehensive device of surveillance. The role of the smartphone would be to pave the way for the agreement of data delivery supported both in voluntary cooperation of users and in the use of data-tracking algorithms in a practice known as tracking. Bibliographic research is the main methodology employed, the research categories are based on the concept of Foucauldian device, so that this concept is used as the method itself for the delimitation of the components of the algorithmic device; consequently, this author is the main theoretical reference used (Foucault, 1996; 2008b; 2014; 2018). However, Bruno's theoretical perspective (2013); Bauman and Lyon (2013); Lazzarato (2014; 2006); and Deleuze (1988; 2000) are also widely present. The argument of this work is that the Foucauldian disciplinary society was not at all replaced by the control society, much less its surveillance devices were extinguished, but rather that these devices took new forms through the broad spectrum of modulation acquired by the communicational technological devices. Keywords: Device; Trackers, Smartphones; Algorithms; Surveillance. ÍNDICE DE QUADROS, FIGURAS E TABELAS Quadro 1 Dispositivo de vigilância algorítmica - diagramação final. ................................................................16 Quadro 2 Características do dispositivo em Foucault.......................................................................................23 Quadro 3 Aplicação das regras do dispositivo de sexualidade ao de vigilância algorítmica ............................. 131 Quadro 4 Elementos heterogêneos do dispositivo de vigilância algorítmica ................................................... 133 Quadro 5 Características do conceito de dispositivo aplicadas ao dispositivo de vigilância algorítmica. ......... 134 Figura 1 Rede de telefonia: layout celular que ilustra a reutilização de frequência ............................................64 Figura 2 Layout da plataforma Exodus ............................................................................................................84 Figura 3 Uso do tipo de conteúdo para terceiros.. ............................................................................................92 Figura 4 Número de rastreadores enviando dados inseguros. ...........................................................................92 Figura 5 Top 10 fontes de terceiros, por alcance. .............................................................................................93 Figura 6 Proporção do tráfego web rastreado por empresas. .............................................................................94 Figura 7 Top 20 organizações pelo alcance combinado do rastreador. a propriedade de um rastreador é baseada na lista de bloqueio do disconnect.. .........................................................................................................95 Figura 8 Presença de trackers no site brasileiro mais acessado em 18 set. 2020, “www.metropoles.com” .........97 Figura 9 Presença de trackers
Recommended publications
  • Anonymous Rate Limiting with Direct Anonymous Attestation
    Anonymous rate limiting with Direct Anonymous Attestation Alex Catarineu Philipp Claßen Cliqz GmbH, Munich Konark Modi Josep M. Pujol 25.09.18 Crypto and Privacy Village 2018 Data is essential to build services 25.09.18 Crypto and Privacy Village 2018 Problems with Data Collection IP UA Timestamp Message Payload Cookie Type 195.202.XX.XX FF.. 2018-07-09 QueryLog [face, facebook.com] Cookie=966347bfd 14:01 1e550 195.202.XX.XX Chrome.. 2018-07-09 Page https://analytics.twitter.com/user/konark Cookie=966347bfd 14:06 modi 1e55040434abe… 195.202.XX.XX Chrome.. 2018-07-09 QueryLog [face, facebook.com] Cookie=966347bfd 14:10 1e55040434abe… 195.202.XX.XX Chrome.. 2018-07-09 Page https://booking.com/hotels/barcelona Cookie=966347bfd 16:15 1e55040434abe… 195.202.XX.XX Chrome.. 2018-07-09 QueryLog [face, facebook.com] Cookie=966347bfd 14:10 1e55040434abe… 195.202.XX.XX FF.. 2018-07-09 Page https://shop.flixbus.de/user/resetting/res Cookie=966347bfd 18:40 et/hi7KTb1Pxa4lXqKMcwLXC0XzN- 1e55040434abe… 47Tt0Q 25.09.18 Crypto and Privacy Village 2018 Anonymous data collection Timestamp Message Type Payload 2018-07-09 14 Querylog [face, facebook.com] 2018-07-09 14 Querylog [boo, booking.com] 2018-07-09 14 Page https://booking.com/hotels/barcelona 2018-07-09 14 Telemetry [‘engagement’: 0 page loads last week, 5023 page loads last month] More details: https://gist.github.com/solso/423a1104a9e3c1e3b8d7c9ca14e885e5 http://josepmpujol.net/public/papers/big_green_tracker.pdf 25.09.18 Crypto and Privacy Village 2018 Motivation: Preventing attacks on anonymous data collection Timestamp Message Type Payload 2018-07-09 14 querylog [book, booking.com] 2018-07-09 14 querylog [fac, facebook.com] … ….
    [Show full text]
  • Whotracks. Me: Shedding Light on the Opaque World of Online Tracking
    WhoTracks.Me: Shedding light on the opaque world of online tracking Arjaldo Karaj Sam Macbeth Rémi Berson [email protected] [email protected] [email protected] Josep M. Pujol [email protected] Cliqz GmbH Arabellastraße 23 Munich, Germany ABSTRACT print users and their devices [25], and the extent to Online tracking has become of increasing concern in recent which these methods are being used across the web [5], years, however our understanding of its extent to date has and quantifying the value exchanges taking place in on- been limited to snapshots from web crawls. Previous at- line advertising [7, 27]. There is a lack of transparency tempts to measure the tracking ecosystem, have been done around which third-party services are present on pages, using instrumented measurement platforms, which are not and what happens to the data they collect is a common able to accurately capture how people interact with the web. concern. By monitoring this ecosystem we can drive In this work we present a method for the measurement of awareness of the practices of these services, helping to tracking in the web through a browser extension, as well as inform users whether they are being tracked, and for a method for the aggregation and collection of this informa- what purpose. More transparency and consumer aware- tion which protects the privacy of participants. We deployed ness of these practices can help drive both consumer this extension to more than 5 million users, enabling mea- and regulatory pressure to change, and help researchers surement across multiple countries, ISPs and browser con- to better quantify the privacy and security implications figurations, to give an accurate picture of real-world track- caused by these services.
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • A Deep Dive Into the Technology of Corporate Surveillance
    Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Author: Bennett Cyphers and Gennie Gebhart ​ A publication of the Electronic Frontier Foundation, 2019. “Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). View this report online: https://www.eff.org/wp/behind-the-one-way-mirror ELECTRONIC FRONTIER FOUNDATION 1 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Behind the One-Way Mirror A Deep Dive Into the Technology of Corporate Surveillance BENNETT CYPHERS AND GENNIE GEBHART December 2, 2019 ELECTRONIC FRONTIER FOUNDATION 2 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction 4 First-party vs. third-party tracking 4 What do they know? 5 Part 1: Whose Data is it Anyway: How Do Trackers Tie Data to People? 6 Identifiers on the Web 8 Identifiers on mobile devices 17 Real-world identifiers 20 Linking identifiers over time 22 Part 2: From bits to Big Data: What do tracking networks look like? 22 Tracking in software: Websites and Apps 23 Passive, real-world tracking 27 Tracking and corporate power 31 Part 3: Data sharing: Targeting, brokers, and real-time bidding 33 Real-time bidding 34 Group targeting and look-alike audiences 39 Data brokers 39 Data consumers 41 Part 4: Fighting back 43 On the web 43 On mobile phones 45 IRL 46 In the legislature 46 ELECTRONIC FRONTIER FOUNDATION 3 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life.
    [Show full text]
  • Giant List of Web Browsers
    Giant List of Web Browsers The majority of the world uses a default or big tech browsers but there are many alternatives out there which may be a better choice. Take a look through our list & see if there is something you like the look of. All links open in new windows. Caveat emptor old friend & happy surfing. 1. 32bit https://www.electrasoft.com/32bw.htm 2. 360 Security https://browser.360.cn/se/en.html 3. Avant http://www.avantbrowser.com 4. Avast/SafeZone https://www.avast.com/en-us/secure-browser 5. Basilisk https://www.basilisk-browser.org 6. Bento https://bentobrowser.com 7. Bitty http://www.bitty.com 8. Blisk https://blisk.io 9. Brave https://brave.com 10. BriskBard https://www.briskbard.com 11. Chrome https://www.google.com/chrome 12. Chromium https://www.chromium.org/Home 13. Citrio http://citrio.com 14. Cliqz https://cliqz.com 15. C?c C?c https://coccoc.com 16. Comodo IceDragon https://www.comodo.com/home/browsers-toolbars/icedragon-browser.php 17. Comodo Dragon https://www.comodo.com/home/browsers-toolbars/browser.php 18. Coowon http://coowon.com 19. Crusta https://sourceforge.net/projects/crustabrowser 20. Dillo https://www.dillo.org 21. Dolphin http://dolphin.com 22. Dooble https://textbrowser.github.io/dooble 23. Edge https://www.microsoft.com/en-us/windows/microsoft-edge 24. ELinks http://elinks.or.cz 25. Epic https://www.epicbrowser.com 26. Epiphany https://projects-old.gnome.org/epiphany 27. Falkon https://www.falkon.org 28. Firefox https://www.mozilla.org/en-US/firefox/new 29.
    [Show full text]
  • Firefox Est En Train De Mourir !
    Firefox est en train de mourir ! 18/07/2018 Bonjour le Monde ! je viens d’apprendre que Firefox ne représente plus que 6% de parts de marché alors qu’il en avait 30% en 2010 ! Il est donc en train de mourir et c’est une très mauvaise nouvelle, importante et très triste car cela confirme le déclin du logiciel libre en général et donc de la faible résistance aux GAFAM et autre pilleurs de vie privée ! Ceci nous prépare d’autres scandales à la Facebook, sans compter tous ceux qui n’ont pas été révélés, que ne vont pas manquer de produire les comportements prioritairement financiers des GAFAM qui, si ils le pouvaient, écraseraient toutes les lois tendant à protéger un tant soit peu votre libre arbitre, un choix sain de concurrence et votre vie privée ! Firefox est développé par la fondation Mozilla, tout comme Thunderbird (client mail), depuis 2002 pour contrer la toute puissance d’Internet Explorer à l’époque. Il s’agit d’un navigateur moderne, performant, sûr (sécurité) et surtout respectueux de votre vie privée depuis le début de sa conception. Firefox est le navigateur par défaut des distributions Linux et ce n’est pas sans raison, mais aussi la base de toute une série d’autres navigateurs ajoutant des fonctionnalités supplémentaires souvent pour une utilisation se voulant soit plus généraliste soit de niche; on peut parler entre autres deTor , champion de la sécurité et de l’anonymat, de Cliqz, de Brave, de Cyberfox, de Waterfox, de Pale Moon (installation bloquée par Windows Defender), deK-Meleon , de Comodo Ice Dragon (celui-ci installe
    [Show full text]
  • Ant Download Manager (Antdm) V.2.3.2
    English Ant Download Manager (AntDM) v.2.4.0 Some of the contents in this manual may differ from the software, as software development continues. User Guide 2021 Table of Contents Overview ....................................................................................................................................................4 System Requirements .........................................................................................................................5 Installation ..................................................................................................................................................6 Uninstall .............................................................................................................................................11 Premium Link Generators (Debrids) .......................................................................................................12 Torrents ....................................................................................................................................................14 Browser Integration ..................................................................................................................................15 Google Chrome .................................................................................................................................16 Chromium Clones ........................................................................................................................17 Mozilla Firefox ....................................................................................................................................18
    [Show full text]
  • Escola Universitària D´Enginyeria Tècnica De
    Escola Tècnica Superior d’Enginyeria Electrònica i Informàtica La Salle Treball Final de Màster Màster Universitari en Enginyeria de Telecomunicació Desarrollo y análisis de resultados de herramienta para el estudio de la privacidad y monetización de la web. Alumne Professors Ponents Albert Terradas Moreno Miguel Ramírez Martín Rosa Maria Pagès ACTA DE L'EXAMEN DEL TREBALL FI DE CARRERA Reunit el Tribunal qualificador en el dia de la data, l'alumne D. va exposar el seu Treball de Fi de Carrera, el qual va tractar sobre el tema següent: Acabada l'exposició i contestades per part de l'alumne les objeccions formulades pels Srs. membres del tribunal, aquest valorà l'esmentat Treball amb la qualificació de Barcelona, VOCAL DEL TRIBUNAL VOCAL DEL TRIBUNAL PRESIDENT DEL TRIBUNAL 2 3 Tabla de contenido 1. Abstract ...................................................................................................................... 9 Resum .......................................................................................................................... 10 2. Resumen ................................................................................................................... 11 3. Introducción ............................................................................................................. 12 3.1 Planteamiento del problema y actuación del DTL ............................................. 12 3.2 Visión global y objetivos del proyecto .............................................................. 13 3.3 Requisitos del proyecto
    [Show full text]
  • A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments
    Proceedings on Privacy Enhancing Technologies ; 2020 (2):24–44 Zhiju Yang and Chuan Yue* A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments Abstract: Web measurement is a powerful approach to 1 Introduction studying various tracking practices that may compro- mise the privacy of millions of users. Researchers have Web tracking is frequently performed over the Internet built several measurement frameworks and performed by various trackers to collect the information of users’ a few studies to measure web tracking on the desk- browsing activities for various purposes including per- top environment. However, little is known about web sonalized advertisement, targeted attacks, and surveil- tracking on the mobile environment, and no tool is lance [12, 21, 32]. Traditionally, stateful HTTP cook- readily available for performing a comparative measure- ies are used as the dominant technique to track online ment study on mobile and desktop environments. In this users [27]. In recent years, advanced stateful tracking work, we built a framework called WTPatrol that allows techniques such as Flash cookies and advanced stateless us and other researchers to perform web tracking mea- tracking techniques such as browser or device finger- surement on both mobile and desktop environments. printing have also become very popular over the Inter- Using WTPatrol, we performed the first comparative net [1, 3, 24, 30]. User privacy has been keeping com- measurement study of web tracking on 23,310 websites promised by trackers that utilize these techniques. that have both mobile version and desktop version web- Web measurement is a powerful approach to study- pages. We conducted an in-depth comparison of the web ing online tracking practices and techniques.
    [Show full text]
  • Cliqz Response to Interim Report
    ! ! Competition and Markets Authority By email only: [email protected] Munich, February 12th, 2020 Comments regarding the online platforms and digital advertising market study, interim report To whom it may concern Thank you for your thorough market study into online platforms and the digital advertising market and for publishing the interim report. We appreciate your investigation of this important topic, for consulting with us during the drafting phase, and for reaching out to us for comments on the interim report. Cliqz is a search engine based in Germany that was designed with privacy as a guiding principle. Over the last five years we have built our own search index and privacy technology, and made these available in the Cliqz browser on all major platforms. All of our technology is built from scratch, driven by privacy by design principles and all client software is open source. In contrast to most other players we run our own, independent search index. Every day, we show that neither big data, cutting edge technology, nor business decisions need to conflict with the essential right to privacy. We want to see more European technologies reach significant market share. This would finally allow consumers to choose products that are ñ designed and built reflecting European values, ñ understood and regulated by our elected or appointed regulators, ñ create value and pay a fair share of taxes in Europe. We strongly believe that Europe should control its own digital infrastructure and ensure digital sovereignty. For the purpose of this goal definition we use the term Europe with the UK included even after Brexit.
    [Show full text]
  • Enhancing the Security and Privacy of the Web Browser Platform Via Improved Web Measurement Methodology
    ABSTRACT JUECKSTOCK, JORDAN PHILIP. Enhancing the Security and Privacy of the Web Browser Platform via Improved Web Measurement Methodology. (Under the direction of Alexandros Kapravelos.) The web browser platform today serves as a dominant vehicle for commerce, communication, and content consumption, rendering the assessment and improvement of that platform’s user security and privacy important research priorities. Accurate web measurement via simulated user browsing across popular real-world web sites is essential to the process of assessing and improving web browser platform security and privacy, particularly when developing improved policies that can be deployed in production to millions of real-world users. However, the state of the art in web browser platform measurement instrumentation and methodology leaves much to be desired in terms of robust instrumentation, reproducible experiments, and realistic design parameters. We propose that enhancing web browser policies to improve privacy while retaining compatibility with legacy content requires robust and realistic web measurement methodologies leveraging deep browser instrumentation. This document comprises research results supporting the above-stated thesis. We demonstrate the limitations of shallow, in-band JavaScript (JS) instrumentation in web browsers, then describe and demonstrate an open source out-of-band instrumentation tool, VisibleV8 (VV8), embedded in the V8 JS engine. We show that VV8 consistently outperforms equivalent in-band instrumentation, provides coverage unavailable to in-band techniques, yet has proved readily maintainable across numerous updates to Chromium and the V8 JS engine. Next, we test the assumption, implicit in typical web measurement studies, that automated crawls generalize to the experience of typical web users with a robustly controlled parallel web measurement experiment comparing observations from multiple network vantage points (VP) and via naive or realistic browser configurations (BC).
    [Show full text]
  • Utilizing Users' Web Browsing and Search Behavior to Improve Website Revisitation
    Ludwig Maximilian University of Munich Institute of Computer Science Media Informatics and Human-Computer Interaction Groups Prof. Dr. Heinrich Hußmann Master’s Thesis Utilizing Users’ Web Browsing and Search Behavior to Improve Website Revisitation Sven Unnewehr [email protected] Date: October 27, 2015 Duration: May 1, 2015 to October 31, 2015 Company: CLIQZ GmbH Supervisor at Company: Dr. Sean Gustafson Supervisor at University: Prof. Dr. Florian Alt Abstract Internet users regularly need to re-find information or content that they looked at in the past. In some cases, these revisitations take place weeks after the initial visit. Long- term revisitations, also called rediscoveries, are often time-consuming, prone to failure and require high mental effort. Existing research showed that current browsers poorly support this activity requiring users to rely on less efficient strategies, such as re-creating queries or re-tracing previous browsing paths, to find the desired information. In two formative studies, I confirmed the existing findings and showed that, on average, rediscoveries take about the same time as the initial search for the information, users often fail because of trouble identifying pages and users are unable to make use of contextual memories. These insights led me to the development of the CLIQZ Browsing History, which acts as a replacement for the browser’s history list. Common user behaviors and memories are directly supported by grouping the history into sessions, by showing context and by providing a searchable query history. Additionally, users are able to explore previous browsing paths and recognize pages using mouseover previews. To evaluate the developed tool, I conducted an evaluation, which confirmed the benefits of the underlying concepts with a promising performance increase after continued usage and users needing significantly fewer page visits for successful rediscoveries.
    [Show full text]