For several years, it has been a poorly kept secret that any Web site you went to could secretly search your browser’s history file to see what sites you had previously visited. All the site owner had to do was ask. And while browser history “sniffing” has been around for a long time, companies are finally starting to actively take advantage of it. The time to act to prevent this clear threat to personal privacy is now.
The History of Browser History Sniffing
Browser history sniffing exploits the functionality of all Web browsers that displays hyperlinks of visited and non-visited sites in different colors. That is, when you visit a Web site that contains links to a number of other urls, the links to sites you have not previously visited will be shown in blue, while the links to sites that you had previously visited will be shown in purple. The links appear this way because the Web page is allowed to query to user’s browser history in order to know what color to render the links on the Web page. Web sites can game this functionality by listing hundreds of Web addresses (often hidden to the user, who doesn’t see the links at all, blue or purple) to get answers from the user’s browser about what color to display the links. In this way, Web sites can effectively play “go fish” with a user’s browser history file, asking if the visitor has visited www.facebook.com, or www.nytimes.com, or, perhaps more personally, www.viagra.com or www.gamblersanonymous.org. If you’re curious to see how it works, the site www.whattheInternetknowsaboutyou.com provides several useful demonstrations.
The existence of this trick to query whether site visitors have visited a predetermined list of urls has been known for a long time. It has been identified as “Bug 147777” in Mozilla’s development forum for nearly eight years. And for years, researchers and privacy advocates have ask that the issue be addressed. To date, nothing has been done, and unscrupulous Web site owners still maintain the capacity to determine whether site visitors have previously visited any other Web site.
Quite apart from the fact that Web sites don’t have the right to see where you’ve been on the Web, there are real dangers to unrestricted access to browser history files. Identity thieves could find out what bank and credit card sites you use for better targeted phishing attacks. Furthermore, recent research suggests that sites could use data about visited urls to accurately determine the identity of site visitors. One study released last month shows how a site could correlate browser history queries with publicly available information about group membership on popular social networking sites to reliably identify a large percentage of visitors to a particular Web site. Thus, if you’re active on any number of popular social networking sites, any Web site you try to visit anonymously could very likely figure out who you are.
Browser History Sniffing Goes Mainstream
The case to address this vulnerability has taken on greater urgency in recent weeks with news that Web analytics companies are starting to market products that directly take advantage of this hack. Last month, Eric Peterson reported on an Israeli firm named Beencounter that openly sells a tool to Web site developers to query whether site visitors had previously visited up to 50 specific urls.
At the moment, Tealium’s product only offers aggregate data to customers for Web analytics purposes, so companies cannot use Tealium to determine whether particular Web visitors have visited certain sites or not. However, there are obviously no inherent limitations on the use of the browser history sniffing. Indeed, Tealium has filed a pending patent application asserting a wide range of other uses of its product, including behavioral advertising and employee monitoring. If companies are allowed to freely search site visitors’ browser history files, it is only a matter of time before we start to see even more invasive applications of this exploit.
The Need for Redress
For years, Web site developers have had the ability to search an incoming visitor’s history file. Now it appears that some Internet companies are taking real advantage of this exploit. The time to act is long overdue.
Browser makers have been aware of this problem for years, but, to date, have failed to act to protect their user’s privacy. They have a responsibility to act with all due haste to fix it now. Researchers have previously released browser add-ons (no longer supported) to address the privacy hole, but no browser has incorporated functionality to protect history files from snooping.
Fortunately, Mozilla, at least appears to be working actively to solve the problem for Firefox after several years of inaction. We call on the makers of the other Web browsers to commit resources to plug the holes in their respective products as well.
- Web site operators
Web site operators (and the marketing and analytics companies they hire) must stop taking advantage of this security hole in direct opposition to consumers’ reasonable expectations about the privacy of their previous Internet communications. Querying site visitor browser history is a line that should not be crossed.
Certainly, companies may seek to legitimately gain user consent before scanning history files, but such consent should be given on an opt-in basis, and only after clear and conspicuous disclosure about what information about the consumer the company intends to access and what the company intends to do with such information. Companies cannot hide notice of browser history inquiries deep in terms of service or privacy policies where consumers are unlikely to notice the disclosures.
- Law enforcement