3. Footprints, Fingerprints, and Connections
Whether simply browsing the web or using the most complex of online tools, users leave behind a distinct trail in the logs of each server they interact with. Sometimes these logs are discarded, but in the case of large online companies, logs are aggregated, mined, and used to create user profiles to help target advertising. These are core points of this book, but what exactly do these logs contain, how is the data captured, and how can users be uniquely identified? This chapter answers these questions by covering how logs are created when using web-based applications and the primary pieces of information they can contain, including information provided by network protocols, software applications (such ...
Get Googling Security: How Much Does Google Know About You? now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.