Introducing Cover Your Tracks!

Today, we’re plea­sed to announce Cover Your Tracks, the newest edition and rebran­ding of our histo­ric brow­ser finger­prin­ting and trac­ker aware­ness tool Panop­ti­click. Cover Your Tracks picks up where Panop­ti­click left off. Panop­ti­click was about letting users know that brow­ser finger­prin­ting was possi­ble; Cover Your Tracks is about giving users the tools to fight back against the trac­kers, and improve the web ecosys­tem to provide privacy for everyone.

animation

A screen capture of the front page of coveryour­tracks.eff.org. The mouse clicks on “Test your brow­ser” button, which loads a results page with a summary of protec­ti­ons the brow­ser has in place against finger­prin­ting and trac­king. The mouse scrolls down to toggle to “detai­led view”, which shows more infor­ma­tion about each metric, such as further infor­ma­tion on System Fonts, Language, and Audi­o­Con­text finger­print, among many other metrics.

Over a decade ago, we laun­ched Panop­ti­click as an expe­ri­ment to see whet­her the diffe­rent charac­te­ris­tics that a brow­ser commu­ni­ca­tes to a website, when viewed in combi­na­tion, could be used as a unique iden­ti­fier that tracks a user as they browse the web. We asked users to parti­ci­pate in an expe­ri­ment to test their brow­sers, and found that overw­hel­mingly the answer was yes—brow­sers were leaking infor­ma­tion that allo­wed web trac­kers to follow their move­ments.

 

 

A screenshot of the older orange Panopticlick website, which shows a human fingerprint graphic.

The old Panop­ti­click website.

 

In this new itera­tion, Cover Your Tracks aims to make brow­ser finger­prin­ting and trac­king more unders­tan­da­ble to the average user.  With help­ful explai­ners accom­pa­nying each brow­ser charac­te­ris­tic and how it contri­bu­tes to their finger­print, users get an in-depth look into just how trac­kers can use their brow­ser against them.

Our brow­sers leave traces of iden­ti­fi­a­ble infor­ma­tion just like an animal might leave tracks in the wild. These traces can be combi­ned into a unique iden­ti­fier which follows users’ brow­sing of the web, like wild­life which has been tagged by an animal trac­ker. And, on the web and in the wild, one of the best ways to confuse trac­kers and make it hard for them to iden­tify you indi­vi­du­ally. Some brow­sers are able to protect their users by making all instan­ces of their brow­ser look the same, regard­less of the compu­ter it’s running on. In this way, there is strength in numbers. Users can also “cover their tracks, ” protec­ting them­sel­ves by insta­lling exten­si­ons like our own Privacy Badger.

 

 "Every time you visit a website, your browser sends little bits of information about itself.

A scre­ens­hot from Cover Your Tracks’ lear­ning page, https://coveryour­tracks.eff.org/learn

 

For begin­ners, we’ve crea­ted a new lear­ning page detai­ling the metho­do­logy we use to mimic trac­kers and test brow­sers, as well as next steps users can take to learn more and protect them­sel­ves. Because trac­king and finger­prin­ting are so complex, we wanted to provide users a way to deep-dive into exac­tly what kind of trac­king might be happe­ning, and how it is perfor­med.

We have also worked with brow­ser vendors such as Brave to provide more accu­rate results for brow­sers that are employing novel anti-finger­prin­ting tech­ni­ques. Add-ons and brow­sers that rando­mize the results of finger­prin­ting metrics have the poten­tial to confuse trac­kers and miti­gate the effects of finger­prin­ting as a method of trac­king. In the coming months, we will provide new info­grap­hics that show users how they can become safer by using brow­sers that fit in with large pools of other brow­sers.

We invite you to test your own brow­ser and learn more – just head over to Cover Your Tracks!