网站正在通过浏览器指纹追踪你
Websites are tracking you via browser fingerprinting

原始链接: https://engineering.tamu.edu/news/2025/06/websites-are-tracking-you-via-browser-fingerprinting.html

研究人员开发了一个新的测量框架FPTrace,用于调查浏览器指纹技术在用户追踪中的应用,其研究范围超越了指纹代码的存在本身。FPTrace分析了广告系统对浏览器指纹变化的反应,重点关注广告商的竞价和HTTP记录。研究表明,更改指纹会影响广告竞价和服务器通信,这证明即使在清除cookie后,指纹技术也被用于识别和定位用户。 令人担忧的是,研究结果表明,即使用户根据GDPR和CCPA等隐私法选择退出,基于指纹的追踪仍然存在。通过将指纹行为与后端竞价流程联系起来,研究证实了配置文件被实时用于调整响应并与第三方共享标识符。这表明当前的隐私工具和政策是不够的。 研究人员主张加强浏览器防御机制,并加强对指纹技术的监管审查,并提议将FPTrace作为审计参与未经授权追踪的网站和提供商的工具。这项研究发表在2025年ACM网络大会(WWW)上,突出了改进对这种侵入式行为的防护的必要性。

这篇 Hacker News 帖子讨论了一项关于浏览器指纹追踪用户行为的最新研究,重点关注其有效性和持久性方面的争论。一位评论者认为指纹的半衰期很短,更依赖于地理位置数据等因素,而另一些人则指出各种浏览器属性相对稳定。 用户们讨论了诸如 amiunique.org 和 coveryourtracks.eff.org 等指纹测试网站的准确性,指出了样本量和方法的局限性。对于“唯一”指纹是否真正代表互联网范围内的唯一性存在分歧。 讨论还探讨了对策,例如使用 VPN、Tor 浏览器、Mullvad 浏览器和广告拦截器。用户们就这些工具有效防止追踪的程度进行了辩论,一些人指出即使是注重隐私的浏览器也可能被指纹识别。总的来说,该帖子揭示了对浏览器指纹技术的细致理解,既承认其追踪的潜力,也承认准确衡量和减轻其影响的挑战。
相关文章

原文

To investigate whether websites are using fingerprinting data to track people, the researchers had to go beyond simply scanning websites for the presence of fingerprinting code. They developed a measurement framework called FPTrace, which assesses fingerprinting-based user tracking by analyzing how ad systems respond to changes in browser fingerprints. This approach is based on the insight that if browser fingerprinting influences tracking, altering fingerprints should affect advertiser bidding — where ad space is sold in real time based on the profile of the person viewing the website — and HTTP records — records of communication between a server and a browser. 

“This kind of analysis lets us go beyond the surface,” said co-author Jimmy Dani, Saxena’s doctoral student. “We were able to detect not just the presence of fingerprinting, but whether it was being used to identify and target users — which is much harder to prove.”

The researchers found that tracking occurred even when users cleared or deleted cookies. The results showed notable differences in bid values and a decrease in HTTP records and syncing events when fingerprints were changed, suggesting an impact on targeting and tracking.

Additionally, some of these sites linked fingerprinting behavior to backend bidding processes — meaning fingerprint-based profiles were being used in real time, likely to tailor responses to users or pass along identifiers to third parties. 

Perhaps more concerning, the researchers found that even users who explicitly opt out of tracking under privacy laws like Europe’s General Data Protection Regulation (GDPR) and California’s California Consumer Privacy Act (CCPA) may still be silently tracked across the web through browser fingerprinting.

Based on the results of this study, the researchers argue that current privacy tools and policies are not doing enough. They call for stronger defenses in browsers and new regulatory attention on fingerprinting practices. They hope that their FPTrace framework can help regulators audit websites and providers who participate in such activities, especially without user consent. 

This research was conducted in collaboration with Johns Hopkins University and presented at the ACM Web Conference (WWW) 2025.

Funding for this research is administered by the Texas A&M Engineering Experiment Station (TEES), the official research agency for Texas A&M Engineering.

联系我们 contact @ memedata.com