Online tracking is a whack-a-mole game between trackers who build and monetize behavioral user profiles through intrusive data collection, and anti-tracking mechanisms, deployed as a browser extension, built-in to the browser, or as a DNS resolver. As a response to pervasive and opaque online tracking, more and more users adopt anti-tracking tools to preserve their privacy. Consequently, as the information that trackers can gather on users is being curbed, some trackers are looking for ways to evade these tracking countermeasures. In this paper we report on a large-scale longitudinal evaluation of an anti-tracking evasion scheme that leverages CNAME records to include tracker resources in a same-site context, effectively bypassing anti-tracking measures that use fixed hostname-based block lists. Using historical HTTP Archive data we find that this tracking scheme is rapidly gaining traction, especially among high-traffic websites. Furthermore, we report on several privacy and security issues inherent to the technical setup of CNAME-based tracking that we detected through a combination of automated and manual analyses. We find that some trackers are using the technique against the Safari browser, which is known to include strict anti-tracking configurations. Our findings show that websites using CNAME trackers must take extra precautions to avoid leaking sensitive information to third parties.
翻译:在线追踪是追踪者之间的一个游戏,他们通过侵扰性数据收集和反跟踪机制,作为浏览器扩展、浏览器内置或DNS解析器,建立行为用户概况并将其货币化,以及作为浏览器扩展、浏览器内置或DNS解析器部署的反跟踪机制。作为对普遍和不透明的在线跟踪的回应,越来越多的用户采用了反跟踪工具来保护他们的隐私。因此,随着跟踪者能够收集到的用户信息正在受到遏制,一些跟踪者正在寻找逃避这些跟踪对策的方法。在本文中,我们报告对一项反跟踪规避计划进行大规模纵向评价,利用CNAME记录在同一地点使用跟踪资源,有效绕过使用固定主机名制块列表的反跟踪措施。我们发现,随着历史的HTTP档案数据,这种跟踪计划正在迅速获得牵引力,特别是在高交易网站之间。此外,我们报告了一些与技术设置相关的隐私和安全问题,我们通过自动化和人工分析的组合检测到。我们发现,有些跟踪者正在使用技术,利用严格的技术来对付基于固定主机名的跟踪系统。