> If you don't have a google account the only thing they can use is your IP
> address and browser/machine details. I wouldn't worry about it , they don't
> know who you are so your information is of very limited use to a 3rd party.
> Plus you can always run your browser in private mode to it doesn't store
> any cookies or just delete them manually after the session.
You are missing the point, but before I answer your actual quote above,
let me link more generally to a story on the BBC News website today
about a current Google case that may interests people contributing to or
reading this thread:
Google data case to be heard in Supreme Court
https://www.bbc.co.uk/news/technology-56901364
To return to your points above ...
While no single one of the pieces of information that you mention above
ON ITS OWN seems to identify very much, put together with other metadata
that can be gathered, they can reveal an astonishing amount, often being
able to identify a particular individual.
https://panopticlick.eff.org/
When I last visited this site some years back (this post is largely a
repost of one first made some years back), clicking 'Test Me' resulted
in (fuller details appended for those interested in what can be
gathered) ...
Test Result
Is your browser blocking tracking ads? ✗ no
Is your browser blocking invisible trackers? ✗ no
Does your browser unblock 3rd parties that promise to honor Do Not
Track? ✗ no
Does your browser protect from fingerprinting? ✗
your browser has a unique fingerprint
Note particularly that last result. It meant that I was easily tracked
as an individual.
For UK residents, I'd recommend listening to a then recent episode of
BBC Inside Science via the BBC iPlayer. Throughout every summer they
showcase the short list for the Royal Society Book Prize. One of the
then candidates was a book by mathematician Dr Hannah Fry called "Hello
World!" about the modern use of computer algorithms. In this clip she
explains how disparate pieces of information, each apparently
insignificant on its own, are pieced together to be able to draw
surprising conclusions. Perhaps the best example she gives is that if
you have a store loyalty card, are female, and buy vitamin pills and
unscented body lotion, they can work out that you're pregnant, and send
you offers for nappies, etc:
https://www.bbc.co.uk/radio/play/b0bgw30j 19:02 minutes in
Alternatively, some time previously she was a guest panellist on The
Infinite Monkey Cage, where she expounded on this story in greater
detail, including that it was an American store called 'Target' and that
in 2012 a father of a teenage daughter had actually gone to his local
store in Minneapolis to complain about her being sent these coupons as
it seemed to be 'normalising' teenage pregnancy, but by the time the
store rang him at home to apologise, his daughter had admitted to him
that she was indeed pregnant.
https://www.bbc.co.uk/programmes/b0b9wbf8 7:38 minutes in
Much of the following needs updating, but nevertheless it's still quite
a good canter around some of the individual threats, but the real danger
is how small, apparently insignificant, pieces of information get
combined into a larger more revealing picture.
https://en.wikipedia.org/wiki/Internet_privacy
Cookies:
"The original developers of cookies intended that only the website that
originally distributed cookies to users could retrieve them, therefore
returning only data already possessed by the website. However, in
practice programmers can circumvent this restriction. Possible
consequences include:
* the placing of a personally-identifiable tag in a browser to
facilitate web profiling (see below)
* use of cross-site scripting or other techniques to steal
information from a user's cookies.
[...] one of the most common ways of theft is hackers taking one's
username and password that a cookie saves. While a lot of sites are
free, they have to make a profit somehow so they sell their space to
advertisers. These ads, which are personalized to one's likes, can often
freeze one's computer or cause annoyance. Cookies are mostly harmless
except for third-party cookies.[23] These cookies are not made by the
website itself, but by web banner advertising companies. These
third-party cookies are so dangerous because they take the same
information that regular cookies do, such as browsing habits and
frequently visited websites, but then they give out this information to
other companies."
Photographs on the Internet
"Face recognition technology can be used to gain access to a person's
private data, according to a new study. Researchers at Carnegie Mellon
University combined image scanning, cloud computing and public profiles
from social network sites to identify individuals in the offline world.
Data captured even included a user's social security number.[45] Experts
have warned of the privacy risks faced by the increased merging of our
online and offline identities. The researchers have also developed an
'augmented reality' mobile app that can display personal data over a
person's image captured on a smartphone screen.[46] Since these
technologies are widely available, our future identities may become
exposed to anyone with a smartphone and an Internet connection.
Researchers believe this could force us to reconsider our future
attitudes to privacy."
Google Street View
" In one instance, Ruedi Noser, a Swiss politician, barely avoided
public scandal when he was photographed in 2009 on Google Street View
walking with a woman who was not his wife – the woman was actually his
secretary"
and so on. Also ...
https://www.bleepingcomputer.com/news/security/new-fingerprinting-techniques-identify-users-across-different-browsers-on-the-same-pc/
https://www.chromium.org/Home/chromium-security/client-identification-mechanisms
https://pet-portal.eu/files/articles/2011/fingerprinting/cross-browser_fingerprinting.pdf
Here are the detailed findings from the browser tracking test ...
Browser Characteristic bits of identifying information one in x
browsers have this value value
Limited supercookie test
0.37
1.29
DOM localStorage: Yes, DOM sessionStorage: Yes, IE userData: No
Hash of canvas fingerprint
20.05
1088160.0
de7fbe2badf5c8a7fff29615325949c3
Screen Size and Color Depth
2.85
7.2
1366x768x24
Browser Plugin Details
21.05
2176320.0
Plugin 0: Java Deployment Toolkit 8.0.1410.15; NPRuntime Script
Plug-in Library for Java(TM) Deploy; npdeployJava1.dll; (;
application/java-deployment-toolkit; ). Plugin 1: Java(TM) Platform SE 8
U141; Next Generation Java Plug-in 11.141.2 for Mozilla browsers;
npjp2.dll; (Java Applet; application/x-java-applet; ) (JavaBeans;
application/x-java-bean; ) (; application/x-java-vm; ) (;
application/x-java-applet;version=1.1.1; ) (;
application/x-java-bean;version=1.1.1; ) (;
application/x-java-applet;version=1.1; ) (;
application/x-java-bean;version=1.1; ) (;
application/x-java-applet;version=1.2; ) (;
application/x-java-bean;version=1.2; ) (;
application/x-java-applet;version=1.1.3; ) (;
application/x-java-bean;version=1.1.3; ) (;
application/x-java-applet;version=1.1.2; ) (;
application/x-java-bean;version=1.1.2; ) (;
application/x-java-applet;version=1.3; ) (;
application/x-java-bean;version=1.3; ) (;
application/x-java-applet;version=1.2.2; ) (;
application/x-java-bean;version=1.2.2; ) (;
application/x-java-applet;version=1.2.1; ) (;
application/x-java-bean;version=1.2.1; ) (;
application/x-java-applet;version=1.3.1; ) (;
application/x-java-bean;version=1.3.1; ) (;
application/x-java-applet;version=1.4; ) (;
application/x-java-bean;version=1.4; ) (;
application/x-java-applet;version=1.4.1; ) (;
application/x-java-bean;version=1.4.1; ) (;
application/x-java-applet;version=1.4.2; ) (;
application/x-java-bean;version=1.4.2; ) (;
application/x-java-applet;version=1.5; ) (;
application/x-java-bean;version=1.5; ) (;
application/x-java-applet;version=1.6; ) (;
application/x-java-bean;version=1.6; ) (;
application/x-java-applet;version=1.7; ) (;
application/x-java-bean;version=1.7; ) (;
application/x-java-applet;version=1.8; ) (;
application/x-java-bean;version=1.8; ) (;
application/x-java-applet;jpi-version=1.8.0_141; ) (;
application/x-java-bean;jpi-version=1.8.0_141; ) (;
application/x-java-vm-npruntime; ) (;
application/x-java-applet;deploy=11.141.2; ) (;
application/x-java-applet;javafx=8.0.141; ). Plugin 2: PDF-XChange
Viewer; PDF-XChange Viewer Netscape Gecko Plugin;
npPDFXCviewNPPlugin.dll; (Portable Document Format; application/pdf;
pdf). Plugin 3: Shockwave Flash; Shockwave Flash 31.0 r0;
NPSWF64_31_0_0_108.dll; (Adobe Flash movie;
application/x-shockwave-flash; swf) (FutureSplash movie;
application/futuresplash; spl).
Time Zone
3.1
8.59
-60
DNT Header Enabled?
0.84
1.79
True
HTTP_ACCEPT Headers
16.1
70203.87
text/html, */*; q=0.01 gzip, deflate, br en-GB,en;q=0.7,fr;q=0.3
Hash of WebGL fingerprint
12.08
4335.3
83663cdc2084dc0bace5dcbde258572b
Language
4.15
17.72
en-GB
System Fonts
16.88
120906.67
Arial, Arial Unicode MS, Book Antiqua, Bookman Old Style, Calibri,
Cambria, Cambria Math, Century, Comic Sans MS, Consolas, Courier,
Courier New, Garamond, Georgia, Helvetica, Impact, Lucida Console,
Lucida Sans Unicode, Microsoft Sans Serif, Monotype Corsiva, MS Gothic,
MS Outlook, MS PGothic, MS Reference Sans Serif, MS Sans Serif, MS
Serif, Palatino Linotype, Segoe Print, Segoe Script, Segoe UI, Segoe UI
Symbol, Tahoma, Times, Times New Roman, Trebuchet MS, Verdana,
Wingdings, Wingdings 2, Wingdings 3 (via javascript)
Platform
3.0
8.02
Win64
User Agent
15.63
50612.09
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:52.9) Gecko/20100101
Goanna/3.4 Firefox/52.9 PaleMoon/27.9.0
Touch Support
0.59
1.51
Max touchpoints: 0; TouchEvent supported: false; onTouchStart
supported: false
Are Cookies Enabled?
0.22
1.17
Yes