Implications on Privacy and Forensics on Current Browsers
Journal Title: Current Journal of Applied Science and Technology - Year 2017, Vol 19, Issue 2
Abstract
To date, the evolution of Web-related technologies has been mainly driven by the user’s quest for ever faster and more intuitive World Wide Web (WWW). One of the most recent stages of this evolution is built around the idea that the user experience can be further improved by enabling the browser to predict and preload Web resources the user is most likely to seek. While this concept of ‘pre-browsing’ is beneficial from the point of view of speed and performance, little thought has been put into understanding and analyzing its potential implications on ‘other’ metrics – including user reputation and privacy. In this paper, we first provide a comprehensive overview of the main pre-browsing mechanisms as implemented in/by today’s browsers. Subsequently, we outline a few hypothetical (yet very real) scenarios in which these mechanisms end up turning the browser into a dangerous tool that acts against its very own user. The ultimate goal of our work is to make the wider Internet community critically rethink the way pre-browsing mechanisms are implemented and used in today’s WWW. CCS Concepts: Information systems ➝ World Wide Web ➝ Social recommendation. • Security and privacy ➝ Systems security ➝ Browser security. • Applied computing ➝ Computer forensics ➝ Evidence collection, storage and analysis.
Authors and Affiliations
Azween Abdullah, Ramachandran Ponnan
Nursery Performance of Male Clones of Poplar (Populus deltoides Bartr.) under Temperate Conditions of Kashmir Valley
Fifteen (15) male clones of Populus deltoides (Twelve clones procured from WIMCO and three local clones) were evaluated in nursery to study their growth performance. The investigations revealed that significant interclon...
Measurement and Determination of Emission Levels of Ionizing Radiation from High Tension Lines around Kaduna Metropolis, North West, Nigeria
Gamma radiation dose rate was measured at the base of 11 KV, 33 KV, 132 KV and 330 KV high tension lines (power lines) from different locations in Kaduna including Mando transmission sub-station using Radex 1503+ model....
Geometry and Topology-based Segmentation of 2-Manifold Triangular Meshes in R3
This manuscript reports a geometrical and a topological methods to segment a closed triangular 2-manifold mesh M R3. The mesh M does not self-intersect) and has no border (i.e. watertight. Geometrical and topological s...
Human Motion Analysis from Depth Video Sequences Using Multi-scale and Multi-directional Features
The emerging cost-effective depth sensors have made easier the action recognition task significantly. In this paper, we propose an effective method to analysis human actions from depth video sequences based on multi-scal...
Cloud Computing: New Opportunities or New Risks? How to Mitigate Cloud Risks in Oil & Gas Industry
The recent emergence of cloud computing has drastically changed general perception of infrastructure architectures, software delivery and development models. Rapid transition towards the cloud environment, has fuelled co...