Exclusive: How the (synced) Cookie Monster breached my encrypted VPN session Panagiotis Papadopoulos Nicolas Kourtellis Evangelos P. Markatos FORTH-ICS, Greece Telefonica Research, Spain FORTH-ICS, Greece
[email protected] [email protected] [email protected] ABSTRACT worse, last year, the USA House of Representatives voted to reverse In recent years, and after the Snowden revelations, there has been a FCC’s regulations that prevented Internet Service Providers (ISPs) significant movement in the web from organizations, policymakers from selling users web-browsing data without their explicit con- and individuals to enhance the privacy awareness among users. sent [14]. Apart from the profit-oriented data collection, ad-related As a consequence, more and more publishers support TLS in their tracking techniques have been also exploited by agencies (as proven websites, and vendors provide privacy and anonymity tools, such after the Snowden revelations [36]) to increase the effectiveness of as secure VPNs or Tor onions, to cover the need of users for privacy- their mass surveillance mechanisms. preserving web browsing. But is the sporadic appliance of such tools This intensive data collection and use beyond the control of the enough to provide privacy? end-users, in some cases has been characterized as pervasive or even In this paper, we describe two privacy-breaching threats against intruding, thus, raising significant privacy concerns [22, 36]. These users accessing the Internet over a secure VPN. The breaches are privacy concerns have made Internet users more privacy-aware [4], made possible through Cookie Synchronization, nowadays widely leading browser vendors to adopt more privacy preserving features used by third parties for advertisement and tracking purposes.