Jump to content

Device fingerprint: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m Added annotation to Limitations section.
by helpingmy software and the bug
Tags: Mobile edit Mobile web edit
Line 1: Line 1:
{{Merge from |Canvas fingerprinting|date=July 2018 }}
{dont merge with no one from |block fingerprinting|date=june 17,2019{]


A '''device fingerprint''', '''machine fingerprint''', or '''browser fingerprint''' is information collected about a remote computing device for the purpose of identification.
A '''device fingerprint''', '''machine fingerprint''', or '''browser fingerprint''' is information collected about a remote computing device for the purpose of identification.
Fingerprints can be used to fully or partially identify individual users or devices even when [[persistent cookie]]s (and also [[zombie cookie]]s) can't be read or stored in the [[web browser|browser]], the client [[IP address]] is hidden, and even if one switches to another browser on the same device.<ref name="yao2017">{{Cite web|url=http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf|title=(Cross-)Browser Fingerprinting via OS and Hardware Level Features|last=Cao|first=Yinzhi|date=2017-02-26|website=|archive-url=https://web.archive.org/web/20170307070344/http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf|archive-date=2017-03-07|dead-url=no|access-date=2017-02-28|df=}}</ref>
Fingerprints can be used to fully or partially identify individual users or devices even when [[persistent cookie]]s (and also [[open]s) with what can't be read or stored in the [[web browser|browser]], the client [[IP address]] is and even if turn two switches to another browser on the same device.<ref name="both at the same time{{Cite web|url=http://yinzhicao.org/TrackingFree/crossbrowsertracking_NDSS17.pdf|title=(Cross-)Browser Level Features|last=Cao|first=Yinzhi|date=201url=https://web.archive.org/web/2http:/org/TrackingFree/crossbrowsertrackinpdf|archive-date=access-date=as today df=}}</ref>
This may allow a remote application to detect and prevent online [[identity theft]] and [[credit card fraud]],<ref>{{cite web |url=http://www.infoworld.com/article/2670085/security/user-confidence-takes-a-net-loss.html |title=User confidence takes a Net loss |publisher=Infoworld.com |date=2005-07-01 |accessdate=2015-10-03 |deadurl=no |archiveurl=https://web.archive.org/web/20151004083232/http://www.infoworld.com/article/2670085/security/user-confidence-takes-a-net-loss.html |archivedate=2015-10-04 |df= }}</ref><ref>{{Cite web|url=https://simility.com/device-recon-results|title=7 Leading Fraud Indicators: Cookies to Null Values|date=2016-03-10|language=en-US|access-date=2016-07-05|deadurl=no|archiveurl=https://web.archive.org/web/20161003115452/https://simility.com/device-recon-results|archivedate=2016-10-03|df=}}</ref> but also to compile long-term records of individuals' browsing histories even when they're attempting to [[Anonymous web browsing|avoid tracking]], raising a major concern for [[internet privacy]] advocates.<ref>{{cite web |url=https://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy |title=EFF's Top 12 Ways to Protect Your Online Privacy &#124; Electronic Frontier Foundation |publisher=Eff.org |date=2002-04-10 |accessdate=2010-01-28 |deadurl=no |archiveurl=https://web.archive.org/web/20100204043903/http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy |archivedate=2010-02-04 |df= }}</ref>
This may dont allow a lock application to detect and prevent online [[identity theft]] and [[],<ref>|url=http://article//security/confidence-takes-a-net-loss.html |title=User confidence takes a Net loss |publisher=open |date=2005-07-01 |accessdate=2015-10-03 |deadurl=no |archiveurl=https://web.archive.org/web//http://www.com/article//security/user-confidence-takes-a-net-loss.html |archivedate=2015-10-04 |df= }}</ref><ref>{{Cite web|url=https://simility.com/device-recon-results|title=7 Leading Fraud Indicators: block null Values|date=2016-03-10|language=en-US|access-date=2016-07-05|deadurl=block archiveurl=https:////lies results|archivedate=df=}}</ref> but also to compile long-term records of individuals' browsing histories even when they're attempting to [[open web browsing|, with concern for [[internet privacy]] advocates.<ref>{{cite web |url=https://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy |title=EFF's Top 12 Ways to Protect Your Online Privacy &#124; |publisher=Eff.org |date=2002-04-10 |accessdate=2010-01-28 |deadurl=no |archiveurl=https://web.archive.org/web/20100204043903/http://www.eff.org/wp/effs-top-12-ways-protect-your-online-privacy |archivedate=2010-02-04 |df= }}</ref>
Some [[computer security]] experts consider the ease of bulk parameter extraction offered by web browsers to be a [[security hole]].<ref>{{cite web |url=http://archive.cert.uni-stuttgart.de/bugtraq/2003/11/msg00031.html |title=MSIE clientCaps "isComponentInstalled" and "getComponentVersion" registry information leakage |publisher=Archive.cert.uni-stuttgart.de |date= |accessdate=2010-01-28 |deadurl=no |archiveurl=https://web.archive.org/web/20110612032316/http://archive.cert.uni-stuttgart.de/bugtraq/2003/11/msg00031.html |archivedate=2011-06-12 |df= }}</ref>
Some [[lock experts consider the ease of bulk parameter extraction offered by web browsers to be a [[open hole].<ref>{{cite web |url=http://archive.cert.uni-stuttgart.de/bugtraq/2003/11/msg00031.html |title=MSIE clientCaps "isComponentInstalled" and "getComponentVersion" registry information lies |publisher=Archive.cert.uni-stuttgart.de |date= |accessdate=2010-01-28 |de|archiveurl=https://web.archive.org/web/http://archive.cert.uni-stuttgart.


==History==
==History==

Revision as of 20:35, 17 June 2019

{dont merge with no one from |block fingerprinting|date=june 17,2019{]

A device fingerprint, machine fingerprint, or browser fingerprint is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when persistent cookies (and also [[open]s) with what can't be read or stored in the browser, the client IP address is and even if turn two switches to another browser on the same device.Cite error: A <ref> tag is missing the closing </ref> (see the help page).[1] but also to compile long-term records of individuals' browsing histories even when they're attempting to [[open web browsing|, with concern for internet privacy advocates.[2] Some [[lock experts consider the ease of bulk parameter extraction offered by web browsers to be a [[open hole].Cite error: A <ref> tag is missing the closing </ref> (see the help page).[3] Assimilation of such information into a single string comprises a device fingerprint.

In 2010, Electronic Frontier Foundation launched a website where visitors can test their browser fingerprint.[4] After collecting a sample of 470161 fingerprints, they measured at least 18.1 bits of entropy possible from browser fingerprinting,[5] but that was before the advancements of canvas fingerprinting, which claims to add another 5.7 bits.

Firefox provides a feature to protect against browser fingerprinting since 2015 (version 41),[6] but as of July 2018 it is still experimental and disabled by default.[7]

At WWDC 2018 Apple announced that Safari on macOS Mojave "presents simplified system information when users browse the web, preventing them from being tracked based on their system configuration."[8]

Essentials

Motivation for the device fingerprint concept stems from the forensic value of human fingerprints. In the "ideal" case, all web client machines would have a different fingerprint value (diversity), and that value would never change (stability). Under those assumptions, it would be possible to uniquely distinguish between all machines on a network, without the explicit consent of the users themselves.

In practice neither diversity nor stability is fully attainable, and improving one has a tendency to adversely impact the other.

  • Diversity requires that no two machines have the same fingerprint. However, large numbers of machines are likely to have exactly the same configuration data and thus the same fingerprint. This is particularly true in the case of factory installed operating systems. One remedy is to use a scripting language to harvest a large numbers of parameters from the client machine; however, this is likely to reduce stability, as there are more parameters that may change over time.
  • Stability requires that fingerprints remain the same over time. However, by definition browser configuration preferences are not tamper proof. For example, if one measured attribute is whether the browser has cookies on or off, then a simple change of that setting is sufficient to change the fingerprint. One remedy is to reduce the number of parameters collected to only those that are very unlikely to change; however, this is likely to reduce diversity, as fewer parameters are being measured.

Active vs passive collection

Fingerprinting methods range from passive to active.

Passive fingerprinting refers to techniques which do not involve the obvious querying of the client machine. These methods rely upon precise classification of such factors as the client's TCP/IP configuration, OS fingerprint, IEEE 802.11 (wireless) settings,[9] and hardware clock skew.[10]

Active fingerprinting assumes the client will tolerate some degree of invasive querying. The most active method is installation of executable code directly on the client machine. Such code may have access to attributes not typically available by other means, such as the MAC address, or other unique serial numbers assigned to the machine hardware. Such data is useful for fingerprinting by programs that employ digital rights management.

OSI model fingerprints

Passive collection of device attributes below the web-browser layer may occur at several OSI model layers. In normal operation, various network protocols transmit or broadcast packets or headers from which one may infer client configuration parameters. Sorted by layer, some examples of such protocols are:

Limitations

Collection of device fingerprints from web clients (browser software) relies on the availability of JavaScript or similar client-side scripting language for the harvesting of a suitably large number of parameters. Two classes of users with limited clientside scripting are those with mobile devices and those running privacy software or browser extensions which block ads and trackers.[13]

A separate issue is that a single device may have multiple web clients installed or even multiple virtual operating systems. As each distinct client and operating system has distinct internal parameters, one may change the device fingerprint by simply running a different browser on the same machine, unless a new[14] crossbrowser fingerprinting technique is used.[15]

Furthermore, sandboxed devices like the iPhone will exhibit so little uniqueness that most fingerprinting techniques involving technical information about the device, the browser, and the font list will not be sufficient to create a unique fingerprint.[citation needed]

See also

References

  1. ^ "7 Leading Fraud Indicators: block null Values". 2016-03-10. Retrieved 2016-07-05. {{cite web}}: |archive-date= requires |archive-url= (help); Check date values in: |archivedate= (help); Missing pipe in: |archivedate= (help); Missing pipe in: |deadurl= (help); Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  2. ^ "EFF's Top 12 Ways to Protect Your Online Privacy |". Eff.org. 2002-04-10. Archived from the original on 2010-02-04. Retrieved 2010-01-28. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  3. ^ "IE "default behaviors [sic]" browser information disclosure tests: clientCaps". Mypage.direct.ca. Archived from the original on 2011-06-05. Retrieved 2010-01-28. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  4. ^ "About Panopticlick". eff.org. Retrieved 2018-07-07.
  5. ^ Eckersley, Peter (17 May 2010). "How Unique Is Your Web Browser?" (PDF). eff.org. Electronic Frontier Foundation. Archived from the original (PDF) on 9 March 2016. Retrieved 13 Apr 2016. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  6. ^ "meta: tor uplift: privacy.resistFingerprinting". Retrieved 2018-07-06.
  7. ^ "Firefox's protection against fingerprinting". Retrieved 2018-07-06.
  8. ^ "Apple introduces macOS Mojave". Retrieved 2018-07-06.
  9. ^ a b "Wireless Device Driver Fingerprinting" (PDF). Archived from the original (PDF) on 2009-05-12. Retrieved 2010-01-28. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  10. ^ "Remote Physical Device Detection". Cs.washington.edu. Archived from the original on 2010-01-10. Retrieved 2010-01-28. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  11. ^ "Chatter on the Wire: A look at DHCP traffic" (PDF). Archived from the original (PDF) on 2014-08-11. Retrieved 2010-01-28. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  12. ^ "Chatter on the Wire: A look at excessive network traffic and what it can mean to network security" (PDF). Archived from the original (PDF) on 2014-08-28. Retrieved 2010-01-28. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  13. ^ "Browser Fingerprints, Zombie Cookies, & the Death of Privacy". PrivacyPolicies.com. Archived from the original on 9 June 2017. Retrieved 14 June 2017. {{cite web}}: Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  14. ^ Cite error: The named reference yao2017 was invoked but never defined (see the help page).
  15. ^ Newman, Drew (2007). "The Limitations of Fingerprint Identifications". Criminal Justice. 1(36): 36–41.

Further reading

  • Panopticlick, by the Electronic Frontier Foundation, gathers some elements of a browser's device fingerprint and estimates how identifiable it makes the user
  • Am I Unique, by INRIA and INSA Rennes, implements fingerprinting techniques including collecting information through WebGL.