How websites spy on you and ignore privacy settings

Even if you tell them not to, many websites cannot resist surveilling your behavior

Published December 1, 2017 5:10PM (EST)

  (<a href='http://www.shutterstock.com/gallery-695464p1.html'>Denys Prykhodov</a>, <a href='http://www.shutterstock.com/gallery-809503p1.html'>Twin Design</a> via <a href='http://www.shutterstock.com/'>Shutterstock</a>//<a href='http://www.istockphoto.com/profile/magnez2'>magnez2</a> via <a href='http://www.istockphoto.com/'>iStock</a>/Salon)
(Denys Prykhodov, Twin Design via Shutterstock//magnez2 via iStock/Salon)

This piece originally appeared on The Conversation.

Hundreds of the world’s top websites routinely track a user’s every keystroke, mouse movement and input into a web form – even before it’s submitted or later abandoned, according to the results of a study from researchers at Princeton University.

And there’s a nasty side-effect: personal identifiable data, such as medical information, passwords and credit card details, could be revealed when users surf the web – without them knowing that companies are monitoring their browsing behavior. It’s a situation that should alarm anyone who cares about their privacy.

The Princeton researchers found it was difficult to redact personally identifiable information from browsing behavior records – even, in some instances, when users have switched on privacy settings such as Do Not Track.

The research found that third party tracking services are used by hundreds of businesses to monitor how users navigate their websites. This is proving to be increasingly challenging as more and more companies beef-up security and shift their sites over to encrypted HTTPS pages.

To work around this, session-replay scripts are deployed to monitor user interface behavior on websites as a sequence of time-stamped events, such as keyboard and mouse movements. Each of these events record additional parameters – indicating the keystrokes (for keyboard events) and screen coordinates (for mouse movement events) – at the time of interaction. When associated with the content of a website and web address, this recorded sequence of events can be exactly replayed by another browser that triggers the functions defined by the website.

What this means is that a third person is able to see, for example, a user entering a password into an online form – which is a clear privacy breach. Websites that employ third party analytics firms to record and replay such behavior is, they argue, in the name of “enhancing user experience”. The more they know what their users are after, the easier it is to provide them with targeted information.

While it’s not news that companies are monitoring our behavior as we surf the web, the fact that scripts are quietly being deployed to record individual browser sessions in this way has concerned the study’s co-author, Steven Englehardt, who is a PhD candidate at Princeton.


A website user replay demo in action.

“Collection of page content by third-party replay scripts may cause sensitive information, such as medical conditions, credit card details, and other personal information displayed on a page, to leak to the third-party as part of the recording,” he wrote. “This may expose users to identity theft, online scams and other unwanted behavior. The same is true for the collection of user inputs during checkout and registration processes.”

Websites logging keystrokes has been an issue known for a while to cybersecurity experts. And Princeton’s empirical study raises valid concerns about users having little or no control over their surfing behaviour being recorded in this way.

So it’s important to help users control how their information is shared online. But there are increasing signs of usability trumping security measures that are designed to keep our data safe online.

Usability vs security

Password managers are used by millions of people to help them easily keep a record of different passwords for different sites. The user of such a service only needs to memorize one key password.

Recently, a group of researchers at the University of Derby and the Open University discovered that the offline clients of password manager services were at risk of exposing the main key password when stored as plain text in memory that could be sniffed or dumped by whole system attacks.

The ConversationUser experience is not an excuse for tolerating security flaws.

Yijun Yu, Senior Lecturer, Department of Computing and Communications, The Open University


By Yijun Yu

MORE FROM Yijun Yu


Related Topics ------------------------------------------

Communications Internet Privacy Privacy Settings Study The Conversation