Skip to main content

Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion)

  • Conference paper
  • First Online:
Security Protocols XXIII (Security Protocols 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9379))

Included in the following conference series:

  • 800 Accesses

Abstract

So we’re calling this one composite privacy, and we want to talk about shifting costs for web tracking or for user tracking. In previous years at this workshop we’ve presented ideas on a variety of subjects. We’ve talked about what we can learn from locks and from safecracking, we’ve talked about eVoting systems, we talked about the benefit you get from the attackers learning curve early in a vulnerability lifecycle, we’ve talked about the P25 radio systems and the problems with those, and we’ve also presented information on the lessons you can learn from casino security, and from military strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sandy Clark .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Clark, S. (2015). Smearing Fingerprints: Changing the Game of Web Tracking and Differential Privacy (Transcript of Discussion). In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26096-9_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26095-2

  • Online ISBN: 978-3-319-26096-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics