Websites Are Now Turning To Audio Fingerprinting To Follow You

TN Note: It turns out that you can be identified even without your IP or computer MAC address, because every computer and browser configuration has a unique audio signal that can be calculated remotely. This is somewhat analogous to smart meter technology that can infer what devices you have in your home simply by reading their electric consumption signatures. Unquestionably, the Intelligence community is already using this technology to identify people everywhere.

 New research into web-tracking techniques has found some websites using audio fingerprinting for identifying and monitoring web users.

During a scan of one million websites, researchers at Princeton University have found that a number of them use the AudioContext API to identify an audio signal that reveals a unique browser and device combination.

“Audio signals processed on different machines or browsers may have slight differences due to hardware or software differences between the machines, while the same combination of machine and browser will produce the same output,” the researchers explain.

The method doesn’t require access to a device’s microphone, but rather relies on the way a signal is processed. The researchers, Arvind Narayanan and Steven Englehardt,

have published a test page to demonstrate what your browser’s audio fingerprint looks like.

“Using the AudioContext API to fingerprint does not collect sound played or recorded by your machine. An AudioContext fingerprint is a property of your machine’s audio stack itself,” they note on the test page.

The technique isn’t widely adopted but joins a number of other approaches that may be used in conjunction for tracking users as they browse the web.

For example, one script that they found combined a device’s current charge level, a canvas-font fingerprint and a local IP address derived from WebRTC, the framework for real-time communications between two browsers.

The researchers found 715 of the top one million websites are using WebRTC to discover the local IP address of users. Most of these are third-party trackers.

Meanwhile, Canvass fingerprinting was found on 14,371 sites with scripts loaded from 400 different domains. The researchers analysed canvass fingerprinting in 2014, and note three changes since then.

Read full story here…

Related Articles That You Might Like

Technocracy.News is the only web site on the Internet that reports on and critiques Technocracy. Please take a minute to support our work on Patreon!

Leave a Reply

Be the First to Comment!

Notify of
avatar
wpDiscuz

The only Authoritative source for

Exposing Technocracy

Stories curated daily from around the world

Subscribe and get the digest!

No SPAM! We will not share your email with any 3rd party.

Thank You for Subscribing!

 

If you don't receive a confirmation email within a few

minutes, please check  your spam/junk folder.

Wath for a confirmation email.