Urban societies have integrated modern technology into its system and are comfortable with its capabilities and compatibility with modern life. However, many are unaware of how such technologies function or operate; often trusting the machines with their personal private information without knowing the consequences, allowing it to have an incredible impact on each individual's privacy. Understanding the workings behind the scenes is the first step to avoiding difficulties, and to eventually find solutions.
Simply put, a host computer runs an application called a hypervisor, which creates virtual machine simulations that simulate physical computers well enough to run any software, including operating systems and end-user applications.[1] Often times, many physical devices such as processors, hard drives and network devices are located in datacenters, responsible for storage and processing needs.[1] Using a combination of software layers allows for effective server management. The Virtualization layer is essential for providing the cloud with resource pooling, location independence, and rapid elasticity.[1] The management layer monitors traffic and responds to fluctuation in server creation or destruction, as well as implement security monitoring and regulations.[1] This system is suitable for sharing, quickly accessing, and updating information in real-time with minimal management or service provider interaction;[1] however, this presents a few problems.
Confidentiality refers to only authorized parties or systems having the ability to access protected data.[1] With a larger number of parties, devices and applications involved, the risk of compromising confidential information expands to multiple points of access.[2] Entrusting data control to the cloud also increases the risk of data compromise, by allowing it to become accessible to an augmented amount of parties.[2]
Advertisement refers to a public announcement and or promotion of a product.[4] Advertisements thoroughly cover every site on the internet. Although it appears to only be a slight irritation, many websites track and mine for each user's actions and may sell the data to advertisers [5]. As stated by Narayanan, "The information that's most useful for them to collect is your browsing history and your search history".[5] Using this information, advertisers can infer a user's behaviour and preferences to present relevant advertisements and to tailor prices.[5] Each user behaves with subtle differences when interacting with a webpage, and this is sufficient to derive a unique fingerprint. This technique of data collection is known as Canvas Fingerprinting.[6] Canvas Fingerprinting is a commonly-used technique adopted by many well-known sites and companies.[7]
A common data-collection technique is the usage of Cookies. Websites may use and or exploit cookies to gather data from its users. Cookie syncing is the process by which various trackers link different given IDs to the same user.[8] The technique is argued to be used to provide relevant advertisements and or information to each user. This is worrisome, as it raises more serious privacy concerns than Canvas Fingerprinting and deletion of a Cookie may prove to be a hassle, as some trackers may "respawn" once cleared.
As stated by Englehardt, "Cookie syncing enables a world of back-end data sharing, and there is so little oversight of the tracking ecosystem that we just don't know what is happening behind the scenes. And this is a problem. Based on the evidence of what we can observe in the browser, it seems that every avenue for data collection and sharing does seem to eventually get utilized".
(See Figure 1) The graph on the left is completely disconnected, meaning the user effectively appears as two different users to the trackers. But when this tracker receives respawned cookies via cookie syncing, they gain the ability to connect the user's visits to websites they track from before and after cookie clearing using vectors. This is called an Evercookie.[8] Although many companies consider this practice to be a deplorable breach of privacy, some trackers respawn and sync their Cookies after the user has cleared all cookies. "Thus, even trackers that don't employ respawning/evercookies nonetheless gain the ability to continually track users who clear cookies".[7]