CS283 - Lecture 6 - Part 3 - Additional Topics - Privacy and Anonymity

CS283 - Lecture 6 - Part 3 - Additional Topics - Privacy and Anonymity

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Lecture 6 Part 3 - Additional Topics – WU Privacy and Anonymity GWU CS 172/283 Autumn 2009 11/16/2009 CS283- 172/Fall06/GWU/Vora/Identity 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
ookies Cookies an be thought of as Post notes for the web (typically 4KB) ¾ Can be thought of as Post-it notes for the web (typically 4KB) ¾ Small files maintained on user’s hard disk, readable only by the site that created them (up to 20 per site) ¾ Used to ¾ Preserve state information about a transaction ¾ identify you when you return to a web site so you don’t have to remember a password elp web sites understand how people use their services (e g ¾ help web sites understand how people use their services (e.g. doubleclick) ¾ Cookies can be harmful ¾ used to profile users and track their activities without their knowledge, especially across web sites ¾ Cookies Can be disabled ¾ To learn about cookies, see Cookie Central at ttp://www cookiecentral com/index2 html 2 http://www.cookiecentral.com/index2.html GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 – Part 3 - Rev 20091117
Background image of page 2
ow oubleClick orks How DoubleClick Works Merchant Server g ltavista Client 1. Client requests a page . Server sends a page with Merchant Cookie DoubleClick Cookie e.g. Altavista Web Page 2. Server sends a page with a DoubleClick URL 4. Client requests the DoubleClick page 3. Text is displayed DoubleClick erver 5. DoubleClick reads its cookie If you choose to give u personal information via the Internet that we or our business partners Server 6. DoubleClick decides which ads to send p may need -- to correspond with you, process an order or provide you with a subscription, for example -- it is our intent to let you know how we will use such information. If you tell us that you do not wish to have this information used as a basis for further contact with you, we will respect your wishes. We do keep track of the domains from which people visit us. We analyze this data for trends and statistics, and then we discard it. 3 GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 – Part 3 - Rev 20091117
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Privacy ¾ We take privacy in our daily lives for granted ¾ In the Internet that is not the case ecent historical examples: ¾ Recent historical examples: ¾ Pentium III chip serial numbers ¾ Read via software (ActiveX or Applets) elps track a user over the web ¾ Helps track a user over the web ¾ After pressure from privacy activists Intel decided to turn it off by default ¾ Could be turned on by software ¾ Not included in later chip designs from Intel due to backlash 4 GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 – Part 3 - Rev 20091117
Background image of page 4
Privacy ¾ Cookies ¾ Used to keep a track of the sites you visit ouble lick and other advertising agencies are main employers of ¾ double-click and other advertising agencies are main employers of cookies arnivore sniffer ¾ Carnivore sniffer ¾ Employed by the FBI ¾ Sniffs email, installed at ISP or in LAN ¾ Emails can be scanned in real time ¾ Supposed to obtain warrant to do this ¾ You could encrypt your message 5 ¾ Abandoned circa 2005 in favor of commercial product alternatives GWU CS 172/283 - Autumn 2009 Holmblad - Lecture 06 – Part 3 - Rev 20091117
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This document was uploaded on 12/05/2009.

Page1 / 31

CS283 - Lecture 6 - Part 3 - Additional Topics - Privacy and Anonymity

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online