Chapter 6: Tracking and Surveillance Flashcards

1
Q

What is UDP?

A

User Datagram Protocol

It is a protocol that sits on top of IP and is used to transmit data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main difference between TCP and UDP?

A

TCP guarantees delivery, UDP does not

This allows UDP to transmit faster when speed is more important than reliability (for example, video streaming)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 3 mail server protocols

A

Internet Message Access Protocol (IMAP)
Post Office Protocol (POP)
POP3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which mail server protocol erases data from the server once it is downloaded?

A

POP and POP3 (depending on configuration)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which method of sending data to a web server includes additional information in the URL? Get or Post?

A

Get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What part of a message is required to route it to the proper destination?

A

The IP header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do you call it when network hardware examines the full body of a message?

A

Deep packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of deep packet inspection?

A
  • Determine whether or not the packets contain malicious content
  • Help prevent data leaks (DLP)
  • Track users’ online behavior (advertisers)
  • Censor or track citizens’ online behaviors (government)
  • Allows network traffic and bandwidth shaping based on the content of a packet
  • Determine the type of content being sent from one host to another (to apply rate limits)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List 2 common attacks performed through Wi-Fi eavesdropping

A

Packet-sniffing systems

HTTP session hijacking or side-jacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List 4 Wi-Fi encryption schemes

A

WEP - Wired Equivalent Privacy
WPA - Wi-Fi Protected Access
WPA2
WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Wi-Fi encryption schemes are considered secure?

A

WPA2

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can spyware monitor user activities?

A

Capturing cookies to determine browsing history
Performing screen captures and transmitting images back to the attacker
Keylogging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does HTTPS provide anonymity?

A

No - network observers still can see the source and destination of traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are first-party cookies?

A

Those set by the primary page that the user is visiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are third-party cookies?

A

Cookies set from all companies other than the primary website whose URL is displayed in a browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are beacons or web bugs?

A

Elements used for tracking that are not visible to the user in the rendered web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the 2 types of cookies?

A

Session

Persistent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is URL rewriting?

A

Websites tracking the links a user clicks on a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which technology can use a computers Media Access Control (MAC) address for tracking?

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What means of storage is used by the Adobe Flash plug-in?

A

Local Shared Objects (LSOs)

AKA Flash cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where are LSOs stored?

A

On the hard drive, separate from HTTP cookies (so clicking clear cookies may not clear LSOs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do many website respawn cookies?

A

They use LSOs to respawn deleted information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Internet Explorer has it’s own way of storing data on the local hard drive, this is called…

A

userData storage

Not cleared when cookies are deleted!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is a pixel hack?

A

A unique identifier is written into a minuscule image, generated on the fly, in the form of the color values for one or more pixels
Since images are often cached, or stored locally by the browser to avoid having to download the resource again in the future, these tracking values can often be retrieved later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does HTML5 store information locally?

A
Either Document Object Model (DOM) storage or web storage
Session storage (for a browser window)
26
Q

What is an entity tag?

A
Entity tags (ETags) are HTTP headers that allow a browser to permanently tag a previously viewed resource
ETags are generally not deleted when a user clears their cookies; rather, ETags may be deleted when a user clears the browser’s cache
27
Q

What is an Evercookie?

A
  • In 2010, a security researcher prototyped a tracking mechanism, the “Evercookie,” designed to be extremely difficult to delete
  • The Evercookie combined multiple techniques, storing unique identifiers in more than ten different locations on a user’s computer
  • If data from one storage location were deleted, this data would be respawned from other locations
28
Q

How can javascript identify links that a user has previously clicked?

A

Web browsers show links on a page that have already been visited in a different color
JavaScript can access the color property

29
Q

What is browser history stealing or sniffing?

A

An unscrupulous page can include thousands of invisible links to popular sites and then use JavaScript to query the color of those links and learn whether a particular page has been visited by the client browser

30
Q

What is browser fingerprinting?

A

Leveraging the unique characteristics of an individual user’s browser—the fonts installed, the particular version of the browser running, the idiosyncrasies of a particular graphics card—as a semi-stable, unique identifier in place of cookies

31
Q

How can images be used to confirm a user opened an email?

A

HTML code sent in an email to that user can request that content uniquely tied to that user be downloaded automatically from a remote server when the message is opened by the recipient

32
Q

What 2 approaches do companies use to facilitate cross-device tracking?

A

Deterministic

Probalistic

33
Q

Provide examples of how companies use probalistic matching to match users across devices

A
  • Matching IP addresses

* Cookies, location and behavioral data

34
Q

How does the Do Not Track (DNT) feature work in web browsers?

A
  • HTTP header sent alongside requests for web content
  • Header can indicate that the user has requested not to be tracked
  • Does not actually block communication
  • Relies on companies to honor this request
  • Mostly a failure and abandoned
35
Q

What is P3P?

A
  • Platform for Privacy Preferences Project (P3P) tokens
  • Machine-readable language with which websites can express their privacy practices
  • The default setting in the Internet Explorer 6 through 10 web browsers blocked third-party cookies when they do not have P3P tokens and when they have P3P tokens indicating a privacy policy considered unsatisfactory by Microsoft’s criteria
  • IE is the only browser who used it
  • P3P not widely adopted by websites
36
Q

Name 3 third-party browser extensions for privacy

A
  • Disconnect
  • Ghostery
  • Privacy Badger
37
Q

Name 2 general-purpose browser add-ons that can limit web tracking

A
  • Adblock Plus (Firefox and Chrome) - blocks many advertisers
  • NoScript (Firefox) - disables JavaScript and Flash
38
Q

What does Mozilla’s Lightbeam tool do?

A

Presents a visualization of which third parties track users across particular websites

39
Q

What is functional privacy?

A

Users’ willingness to aim for as much privacy as they can get without breaking the functionality of what they hope to accomplish

40
Q

What privacy functionality does the DuckDuckGo browser offer?

A

Does not use HTTP cookies except to save preferences about the page layout a user has chosen, nor does it allow the HTTP Referer field to contain information about the search query

41
Q

What privacy functionality does the TrackMeNot add-on in Firefox and Chrome offer?

A

Protects a user’s privacy by issuing decoy queries to major search engines

42
Q

How are phone locations determined?

A

After determining the phone’s position relative to a handful of towers whose locations are known by the cellular provider, the position of the phone can then be determined geometrically through triangulation
Wi-Fi signals a phone receives can help determine its location

43
Q

Is location divulged when using GPS?

A

No, devices receive and do not transmit any signals in the GPS process, devices do not automatically reveal their location

Though, a smartphone that determines its own location by receiving signals from GPS satellites might subsequently, and automatically, share that information with an app or the phone provider

44
Q

What are the 2 RFID chip types?

A
  • Passive

* Active

45
Q

What is the main difference between passive and active RFID chips?

A

Active has its own power source, passive does not

46
Q

How do RFIDs work?

A

The unique serial number associated with each RFID tag allows for location tracking

If additional information is stored on the tag, the reader is also able to pick up that information

47
Q

How can phones be located within buildings?

A

Receivers installed within the building complex

48
Q

Why does the FCC require that phone location be trackable?

A

In case an emergency 911 call is placed

49
Q

What is near-field communication (NFC)?

A

Technology that can support location-based advertising via radio waves when the phone is in close proximity

50
Q

How can privacy be respected when dealing with location-tracking technologies?

A
  • Should only be included when there is a direct benefit
  • Should be opt-in rather than opt-out
  • Users should be able to see what is stored about them and delete or update any past location data
51
Q

What is a roving bug?

A

Remotely activated smartphone microphone

52
Q

Who is allowed to use remotely activated cell phone-based audio surveillance?

A

FBI

53
Q

What are Remote Access Trojans (RATs)?

A

Malware that allows an attacker to take control of the camera or microphone

54
Q

What privacy issues exist with smart TVs?

A
  • Voice commands are sent to remote servers for processing - this data could be compromised
  • Malware can repurpose the microphones into surveillance devices
  • Some smart televisions track what you watch
55
Q

What is automated content recognition (ACR)?

A

Technology used by smart TVs to determine what the user is watching

56
Q

Why is CCTV and Facial Recognition become such an important topic?

A

The increase in the number of cameras out there combined with advances in the accuracy of facial recognition

57
Q

What privacy issues exist with voice over IP systems?

A
  • Researchers have demonstrated that simply having access to the encrypted version of a message may be sufficient for using linguistic techniques to reconstruct the call if certain types of encryption are used
  • Metadata about a communication can often leak a large amount of the communication
58
Q

What is ubiquitous computing (or ubicomp)?

A

Refers to the transition of computing from purpose-built, independent computing devices to computing that occurs at all times and in all places

59
Q

What is a smart city?

A

Sometimes, the concept of a smart city refers to a city that aggregates and makes available existing data from its traditional functions in an open format and to all citizens

The concept of a smart city is also used to describe cities that introduce large numbers of new sensors and actuators, adding computerized sensing and control to systems that did not previously have such capabilities
• tracking devices on government-owned vehicles
• automated license plate readers to track nongovernment vehicles similarly
• Analytics for utility systems
• Cameras for a multitude of reasons
• Street corner sensors to detect environmental factors, gunshots or the movement of pedestrians

60
Q

Why are accelerometers in smartphones a privacy risk?

A
  • An accelerometer alone, even without persistent location awareness, can determine the distance traveled and therefore leak information about the user’s location relative to a previous position
  • It can also leak information about the passwords a user types into their phone
61
Q

What is a major difficulty in communicating privacy information for IoT devices?

A

They often lack a user interface