1 code implementation • 7 Aug 2023 • Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby
While privacy-focused browsers have taken steps to block third-party cookies and mitigate browser fingerprinting, novel tracking techniques that can bypass existing countermeasures continue to emerge.
no code implementations • 24 Jun 2019 • Sandra Siby, Marc Juarez, Claudia Diaz, Narseo Vallina-Rodriguez, Carmela Troncoso
Virtually every connection to an Internet service is preceded by a DNS lookup which is performed without any traffic-level protection, thus enabling manipulation, redirection, surveillance, and censorship.
Cryptography and Security