Abstract

Abstract Although tracking via social media platforms is widely recognized, as demonstrated by the Cambridge Analytica/Facebook scandal in 2018, other forms of tracking are less well known. Devices such as computers, cameras, and mobile phones can be identified by indicators such as screen size, software versions, and installed fonts. This is called ‘browser fingerprinting’. Commercial software can ‘fingerprint’ web browsers and analyse use without users’ knowledge, even when these users are aware enough to block browsing cookies and/or use virtual private networks (VPNs). This raised significant interest and concern from the engineering community which prompted a number of initiatives within standards-developing organizations (SDOs). This chapter covers case studies detailing work to mitigate the evasion of personal privacy in protocol development within the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C). It demonstrates how SDO work is flanked and supported externally by academics, digital rights groups, and wider civil society organizations.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call