Feeds

Hundreds of websites share usernames sans permission

Photobucket, Wall Street Journal, Home Depot take liberties with your personal info

Remote control for virtualized desktops

Home Depot, The Wall Street Journal, Photobucket, and hundreds of other websites share visitor's names, usernames, or other personal information with advertisers or other third parties, often without disclosing the practice in privacy policies, academic researchers said.

Sixty-one percent of websites tested by researchers from Stanford Law School's Center for Internet and Society leaked the personal information, sometimes to dozens of third-party partners. Home Depot, for example, disclosed the first names and email addresses of visitors who clicked on an ad to 13 companies. The Wall Street Journal divulged to seven of its partners the email address of users who enter the wrong password. And Photobucket handed over the usernames of those who use the site to share images with their friends.

The report comes as US officials have proposed a mandatory Do Not Track option for all websites. Some operators have argued such measures are unnecessary because their systems for tracking visitors' browsing histories aren't linked to a user's specific identity.

In the report, Jonathan Mayer, a Stanford graduate student who led the study, argued against the claim that the online tracking is anonymous. A username alone, he explained, is often more than adequate to identify the owner, and when it's combined with other information, such as his geographic location or first name, even widely used usernames can be uniquely assigned to an individual.

“We believe there is now overwhelming evidence that third-party web tracking is not anonymous,” he wrote. “It is a legitimate policy question whether, on balance, Do Not Track should be enforced by law. But the difficult weighing of competing privacy risks and economics can't be short-circuited by claims of anonymity.”

The report studied websites included in the Quantcast top 250 that offered user signups, didn't require a purchase or other qualification to create a username, and didn't include so many features as to be impractical for study. Of the 185 sites that met the three criteria, 113 of them included usernames and other identifiers in the URLs they shared with advertisers and analytics partners. The five biggest recipients were ComScore, Google Analytics, Google's DoubleClick, Quantcast, and Facebook.

The report cited privacy policies of many of the websites that appeared to make no mention of the practice. The WSJ's, for example, says: “We will not sell, rent, or share your personal information with these third parties for such parties' own marketing purposes.” In its own policy, Home Depot says it “will not trade, rent or sell your personal information, without your prior consent.”

The Stanford researchers have previously documented a variety of attempts by websites and marketers to track users's browsing habits, sometimes when they've taken pains to remain anonymous.

In August, they revealed JavaScript hosted on MSN.com and three other Microsoft websites that secretly logged visitors' browsing histories across multiple web properties, even when the users deleted browser cookies to elude tracking. The researchers also exposed a marketer that helped websites deliver targeted ads by exploiting a decade-old browser flaw that leaks the history of websites that users visit. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.