- Joined
- Feb 20, 2003
- Messages
- 15,040
- Reaction score
- 1,188
12|10|2010 1:27 pm EDT
NamePros.com Gets Outed In Browser History Sniffing Fiasco
by Adam Strong
In a story on ZDNet this week, adult website YouPorn.com is being sued for âbrowser history sniffingâ. ZDNet points to a study conducted by University of California, San Diego of the global to 50,000 sites on the internet. In the study the researchers claim to have âconfirmed that 46 websites used browser (history) sniffing to see which sites users visited before they arrived, and noted 326 sites they deemed âsuspiciousâ in history tracking practices.â Of the 46 sites mentioned, Namepros.com was one that the researches found to be engaging in this âsuspiciousâ browser history sniffing and âactually doing history hijackingâ.
Browser history sniffing typically uses javascript to allow the site operator to gain access to information about site users. Much of the information can be used to improve user experience. Typically online aggregators, social bookmarking services and ad networks use code that sniffs browser histories.
The UCSD report also mentions other sites such as Youtube and Microsoft were also performing some covert behavioral sniffing of site visitors. Many more sites are likely involved in browser history sniffing or some form of behavior tracking, some may not even be aware that they are doing so. Ad networks, browser tools and other services provided by companies like Interclick and Meaningtool reportedly are the source of most of these âsuspicious activitiesâ.
The plaintiffs in the case claim YouPorn is violating the U.S. Computer Fraud and Abuse Act as well as California computer laws as well as deceptive and unfair business practices and competition. We suspect that NamePros was using scripts from an ad network Feedjit, as owner Ron James points out in our comments section, and was caught up in what looks like a privacy-witch-hunt. Weâve emailed NamePros.com owner Ron James about this story and have not heard back from him yet.
If you want to protect yourself from browser history sniffing, there are some things you can do . According to an article on About.com , you can delete your browser history cache frequently or change the way that your browser handles visited links. If you click on a link in most browsers it changes color. The sniffers compare your cache to see what links in your cache you have clicked, if you set your âvisited linkâ color to the same color as a ânon-clickedâ link this may block the sniffer from know where you visited. DNN provides no guarantee that this will protect you from browser history sniffing.
http://www.domainnamenews.com/news/nameproscom-outed-browser-history-sniffing-fiasco/8482
http://www.zdnet.com/blog/perlow/yo...d-named-in-tracking-scandal/15127?tag=nl.e539
NamePros.com Gets Outed In Browser History Sniffing Fiasco
by Adam Strong
In a story on ZDNet this week, adult website YouPorn.com is being sued for âbrowser history sniffingâ. ZDNet points to a study conducted by University of California, San Diego of the global to 50,000 sites on the internet. In the study the researchers claim to have âconfirmed that 46 websites used browser (history) sniffing to see which sites users visited before they arrived, and noted 326 sites they deemed âsuspiciousâ in history tracking practices.â Of the 46 sites mentioned, Namepros.com was one that the researches found to be engaging in this âsuspiciousâ browser history sniffing and âactually doing history hijackingâ.
Browser history sniffing typically uses javascript to allow the site operator to gain access to information about site users. Much of the information can be used to improve user experience. Typically online aggregators, social bookmarking services and ad networks use code that sniffs browser histories.
The UCSD report also mentions other sites such as Youtube and Microsoft were also performing some covert behavioral sniffing of site visitors. Many more sites are likely involved in browser history sniffing or some form of behavior tracking, some may not even be aware that they are doing so. Ad networks, browser tools and other services provided by companies like Interclick and Meaningtool reportedly are the source of most of these âsuspicious activitiesâ.
The plaintiffs in the case claim YouPorn is violating the U.S. Computer Fraud and Abuse Act as well as California computer laws as well as deceptive and unfair business practices and competition. We suspect that NamePros was using scripts from an ad network Feedjit, as owner Ron James points out in our comments section, and was caught up in what looks like a privacy-witch-hunt. Weâve emailed NamePros.com owner Ron James about this story and have not heard back from him yet.
If you want to protect yourself from browser history sniffing, there are some things you can do . According to an article on About.com , you can delete your browser history cache frequently or change the way that your browser handles visited links. If you click on a link in most browsers it changes color. The sniffers compare your cache to see what links in your cache you have clicked, if you set your âvisited linkâ color to the same color as a ânon-clickedâ link this may block the sniffer from know where you visited. DNN provides no guarantee that this will protect you from browser history sniffing.
http://www.domainnamenews.com/news/nameproscom-outed-browser-history-sniffing-fiasco/8482
http://www.zdnet.com/blog/perlow/yo...d-named-in-tracking-scandal/15127?tag=nl.e539