To Be or Not to Be (in the EU): Measurement of Discrepancies Presented in Cookie Paywalls
- URL: http://arxiv.org/abs/2410.06920v2
- Date: Thu, 10 Oct 2024 12:59:54 GMT
- Title: To Be or Not to Be (in the EU): Measurement of Discrepancies Presented in Cookie Paywalls
- Authors: Andreas Stenwreth, Simon Täng, Victor Morel,
- Abstract summary: This study explores the effects of three factors: 1) the clients' browser, 2) the device type (desktop or mobile), and 3) the geographic location on the presence and behavior of cookie paywalls.
Using an automatic crawler on our dataset composed of 804 websites that present a cookie paywall, we observed that the presence of a cookie paywall was most affected by the geographic location of the user.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Cookie paywalls allow visitors to access the content of a website only after making a choice between paying a fee (paying option) or accepting tracking (cookie option). The practice has been studied in previous research in regard to its prevalence and legal standing, but the effects of the clients' device and geographic location remain unexplored. To address these questions, this study explores the effects of three factors: 1) the clients' browser, 2) the device type (desktop or mobile), and 3) the geographic location on the presence and behavior of cookie paywalls and the handling of users' data. Using an automatic crawler on our dataset composed of 804 websites that present a cookie paywall, we observed that the presence of a cookie paywall was most affected by the geographic location of the user. We further showed that both the behavior of a cookie paywall and the processing of user data are impacted by all three factors, but no patterns of significance could be found. Finally, an additional type of paywall was discovered to be used on approximately 11% of the studied websites, coined the "double paywall", which consists of a cookie paywall complemented by another paywall once tracking is accepted.
Related papers
- Browsing without Third-Party Cookies: What Do You See? [5.181502547611254]
Third-party web cookies are often used for privacy-invasive behavior tracking.
To understand the effects of such third-party cookieless browsing, we crawled and measured the top 10,000 Tranco websites.
We develop a framework to remove third-party cookies and analyze the differences between the appearance of web pages with and without these cookies.
arXiv Detail & Related papers (2024-10-14T17:47:43Z) - How Unique is Whose Web Browser? The role of demographics in browser fingerprinting among US users [50.699390248359265]
Browser fingerprinting can be used to identify and track users across the Web, even without cookies.
This technique and resulting privacy risks have been studied for over a decade.
We provide a first-of-its-kind dataset to enable further research.
arXiv Detail & Related papers (2024-10-09T14:51:58Z) - A first look into Utiq: Next-generation cookies at the ISP level [3.434440572295625]
Third-party cookies have been widely used for years, they have also been criticized for their potential impact on user privacy.
Many browsers allow users to block third-party cookies, which limits their usefulness for advertisers.
We take a first look at Utiq, a new way of user tracking performed directly by the ISP, to substitute the third-party cookies.
arXiv Detail & Related papers (2024-05-15T09:23:59Z) - Legitimate Interest is the New Consent -- Large-Scale Measurement and
Legal Compliance of IAB Europe TCF Paywalls [2.5944208050492183]
We study the prevalence of cookie paywalls on the top one million websites using an automatic crawler.
We identify 431 cookie paywalls, all using the Transparency and Consent Framework (TCF)
We observe that cookie paywalls extensively rely on legitimate interest legal basis systematically conflated with consent.
arXiv Detail & Related papers (2023-09-20T20:24:52Z) - FedDefender: Client-Side Attack-Tolerant Federated Learning [60.576073964874]
Federated learning enables learning from decentralized data sources without compromising privacy.
It is vulnerable to model poisoning attacks, where malicious clients interfere with the training process.
We propose a new defense mechanism that focuses on the client-side, called FedDefender, to help benign clients train robust local models.
arXiv Detail & Related papers (2023-07-18T08:00:41Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - Poisoning Web-Scale Training Datasets is Practical [73.34964403079775]
We introduce two new dataset poisoning attacks that intentionally introduce malicious examples to a model's performance.
First attack, split-view poisoning, exploits the mutable nature of internet content to ensure a dataset annotator's initial view of the dataset differs from the view downloaded by subsequent clients.
Second attack, frontrunning poisoning, targets web-scale datasets that periodically snapshot crowd-sourced content.
arXiv Detail & Related papers (2023-02-20T18:30:54Z) - User Perception and Actions Through Risk Analysis Concerning Cookies [1.2891210250935146]
We conducted a user study through a control versus experimental group survey.
Our goal was to gauge how user knowledge reflected their security and privacy preferences on the internet.
We analyzed user awareness of cookies, their privacy implications, and how risk communication can impact user behavior.
arXiv Detail & Related papers (2022-11-14T14:02:50Z) - The Impact of User Location on Cookie Notices (Inside and Outside of the
European Union) [3.719580143660037]
We crawl 1,500 European, American, and Canadian websites from each of 18 countries.
Using a series of regression models, we find that the website's Top Level Domain explains a substantial portion of the variance in cookie notice metrics.
There is one exception to this finding: cookie notices differ when accessing.com domains from inside versus outside of the EU.
arXiv Detail & Related papers (2021-10-19T10:42:39Z) - What You Can Learn by Staring at a Blank Wall [92.68037992130559]
We present a passive non-line-of-sight method that infers the number of people or activity of a person from the observation of a blank wall in an unknown room.
Our technique analyzes complex imperceptible changes in indirect illumination in a video of the wall to reveal a signal that is correlated with motion in the hidden part of a scene.
arXiv Detail & Related papers (2021-08-30T07:30:19Z) - Backdoor Learning: A Survey [75.59571756777342]
Backdoor attack intends to embed hidden backdoor into deep neural networks (DNNs)
Backdoor learning is an emerging and rapidly growing research area.
This paper presents the first comprehensive survey of this realm.
arXiv Detail & Related papers (2020-07-17T04:09:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.