Skip to main content

Google Caught Tracking Safari Users: What You Need to Know

Google Caught Tracking Safari Users: What You Need to Know

google-magnifying-glass-600Google is in a lot of hot water over recent revelations about how it tracks user activity on Apple devices — particularly iPhones and iPads.
As reported by The Wall Street Journal, an independent researcher has discovered that Google embeds hidden software on many websites — software designed to circumvent the default settings on a web browser to record a user's behavior.
The issue involves how Safari, the default web browser on Apple devices, deals with cookies. Cookies, of course, are the little pieces of information (such as a user ID) that a website can leave on your phone, tablet or computer and later retrieve. Cookies allow you to log in to a website such as Flickr, and return without needing to log in again.
Cookies also enable advertisers to track your behavior. By keeping track of what you're looking at on one website, an ad network can serve you ads, based on those clicks, on another. Users can prevent that from happening via certain settings, but not all web browsers approach the issue in the same way.
So how is Safari different? What's at stake? And what can a concerned user do about it? Read on:
What exactly was Google caught doing?
Google was using a software trick to get around a Safari setting that only allow certain types of cookies. That way the company could put cookies on a user's device, letting it track sites visited, which in turn let Google tailor advertising to the user.
Why would it need to "trick" Safari into doing that?
By default, Safari blocks cookies from third parties. Most browsers allow users to block cookies, but don't set it as a default. Google happens to operate many of its advertising services, including DoubleClick, from a domain outside Google.com — a domain which Safari treats as a third party. So even if a user was logged into Google, DoubleClick was blocked from serving ads to the user — unless that user approved the cookie by, say, filling out a form.
How did Google get around that?
The company put a hidden field in some of its sites that essentially acted as a form, even though the user never filled out anything. That told Safari it was OK for DoubleClick to serve ads to the unknowing, unwitting user.
Why would Google do that?
Google says it's all an accident. Even though Google's primary business is advertising and the Safari browser on iPhones and iPads is said to account for more than 50% of mobile browsing, Google says it was merely taking advantage of a known workaround in Safari that lets do things like use Google's "+1" buttons on sites outside the Google.com domain.
Come again?
Modules like the "+1" button and the Facebook Like button appear on many different sites, and users generally expect them to work without changing their browser settings. Facebook even encourages developers to exploit the same Safari quirk Google targeted here. Google says it was only trying to enable such functionality with those hidden fields, and it "didn't anticipate" advertising cookies to be set on Safari.
Is Google doing anything about it?
Yes, it says it's started removing these cookies from Safari browsers.
What does Google do with the information it collected?
Until it started removing the cookies, the company used the information mainly to tailor ads based on the websites you visited. The cookie doesn't track personal information, such as your address or phone number.
Will Google face any penalties for this?
It's unclear. Google is under close watch by the FTC for privacy violations, and this might qualify. For its part, the FTC acknowledged to Mashable that it was aware of the issue, but didn't say if it would do anything about it.
Is Google the only one doing this?
No. The original testing by Stanford grad student Jonathan Mayer pointed the finger at three other companies — Vibrant Media, Media Innovation Group and PointRoll — all of which exploit Safari's quirks to serve ads to unsuspecting users.
Can Apple do anything about this "quirk?"
Apple says it's working on a way to "put a stop" to third parties circumventing Safari's privacy settings.
What can I do if I'm concerned about this?
To ensure that no one puts unwanted cookies on your device, simply go into your browser settings and choose the option to never accept cookies. However, that will also mean you'll have a hard time logging into many sites. Another option is to simply clear your browser of cookies regularly. You can do that in you settings as well.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…