SlideShare une entreprise Scribd logo
1  sur  11
Zombie cookies Abdul Rahman Al-Mudaiheem
Table of content What are Zombie Cookies?  Differences between them & regular cookies. How do they work exactly?  Who used them? Purposes of using them.  Privacy Breach. How to kill them?
What Are zombie cookies? They are cookies that rise from the dead come back to life after you kill delete them. It was first identified by UC Berkley They noticed that they were deleting cookies, but they kept coming back over and over again.  No amount of deleting them would kill them.  Many people have absolutely no idea what a zombie cookie is, or that they even exist.  Until a massive lawsuit in 2009, which targeted some of the biggest names on the web. Because of breach of privacy (More on that later).
Differences between them & regular cookies.
How do they work exactly? What you think happens:  You visit a website.  They plant browser Cookies. You visit the website again, and they retrieve those cookies.  You can block them or delete them. And that’s that.
How do they work exactly? What REALLY happens (in some cases):  You visit a website.  They plant browser Cookies AND Adobe Flash cookies.  You block or delete regular cookies. Doesn’t matter! You visit the website again, they check for regular cookies. No luck?  They check for Adobe Flash cookies, which are EXACTLY the same, if not even more detailed (remember 4kb vs. 100kb) So in a sense, you deleting or blocking browser cookies doesn’t matter. Because Zombie cookies are there.
Who used them? that is just for starters. It isn’t even the tip of the iceberg when it comes to who is hiding zombie cookies on your computer.
Purposes of using them. Marketing Research  Tracking personal browsing habits.  Since Zombie cookies have a bigger size, they store more, detailed information about users’ behavior.  Remember unique visitors.  Preferences, such as video volume or page layout, are saved, no matter what browser you use.  When a site bans a user, he/she will still be banned even if you delete browser cookies or use different browsers.
Privacy Breach Fact: almost 98% of computers have Adobe Flash, which means almost everyone is exposed to Zombie Cookies. Some people feel that if you delete or block a cookie, it should stay deleted.  But since Zombie cookies are not affected by regular deletion of cookies, people consider sites that use them to be breaching their privacy.  A huge lawsuit was filed against Clearspring and affiliated sites owned by Walt Disney Internet Group, Warner Bros and others. It said that Adobe Flash cookies, a type of zombie cookie, are planted to "track Plaintiffs and Class Members that visited non-Clearspring Flash Cookie Affiliates websites by having their online transmissions intercepted, without notice or consent".
How to kill them? Before:  You had to uninstall Adobe Flash, and re-install it.  Now:  Go to Adobe’s webpage and set controls on the Global Privacy Settings page (Google this for more details). . If you use Firefox you can get rid of Flash cookies - including zombie cookies- by using theBetterPrivacy add-on.
That’s it  Thank you.

Contenu connexe

Similaire à Zombie Cookies

online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]yvonneschnurr
 
EU cookie law - solutions
EU cookie law - solutionsEU cookie law - solutions
EU cookie law - solutionssamie19
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party CookiesWill Clayton
 
What is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodWhat is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodGaurav Sood
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blogMathew peter
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies TrackingAK DigiHub
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW
 
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upHow to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upAdoniscooper
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendKanu Priya
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Sis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanSis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanMediaPost
 

Similaire à Zombie Cookies (20)

online spying tools
online spying toolsonline spying tools
online spying tools
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
EU cookie law - solutions
EU cookie law - solutionsEU cookie law - solutions
EU cookie law - solutions
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookie presentation
Cookie presentationCookie presentation
Cookie presentation
 
Cookie management
Cookie managementCookie management
Cookie management
 
Understanding the law on cookies
Understanding the law on cookiesUnderstanding the law on cookies
Understanding the law on cookies
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
 
What is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodWhat is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav Sood
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blog
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Do not track me
Do not track meDo not track me
Do not track me
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
 
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upHow to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-up
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trend
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Sis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanSis fri 1030 aaron goldman
Sis fri 1030 aaron goldman
 

Dernier

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Zombie Cookies

  • 1. Zombie cookies Abdul Rahman Al-Mudaiheem
  • 2. Table of content What are Zombie Cookies? Differences between them & regular cookies. How do they work exactly? Who used them? Purposes of using them. Privacy Breach. How to kill them?
  • 3. What Are zombie cookies? They are cookies that rise from the dead come back to life after you kill delete them. It was first identified by UC Berkley They noticed that they were deleting cookies, but they kept coming back over and over again. No amount of deleting them would kill them. Many people have absolutely no idea what a zombie cookie is, or that they even exist. Until a massive lawsuit in 2009, which targeted some of the biggest names on the web. Because of breach of privacy (More on that later).
  • 4. Differences between them & regular cookies.
  • 5. How do they work exactly? What you think happens: You visit a website. They plant browser Cookies. You visit the website again, and they retrieve those cookies. You can block them or delete them. And that’s that.
  • 6. How do they work exactly? What REALLY happens (in some cases): You visit a website. They plant browser Cookies AND Adobe Flash cookies. You block or delete regular cookies. Doesn’t matter! You visit the website again, they check for regular cookies. No luck? They check for Adobe Flash cookies, which are EXACTLY the same, if not even more detailed (remember 4kb vs. 100kb) So in a sense, you deleting or blocking browser cookies doesn’t matter. Because Zombie cookies are there.
  • 7. Who used them? that is just for starters. It isn’t even the tip of the iceberg when it comes to who is hiding zombie cookies on your computer.
  • 8. Purposes of using them. Marketing Research Tracking personal browsing habits. Since Zombie cookies have a bigger size, they store more, detailed information about users’ behavior. Remember unique visitors. Preferences, such as video volume or page layout, are saved, no matter what browser you use. When a site bans a user, he/she will still be banned even if you delete browser cookies or use different browsers.
  • 9. Privacy Breach Fact: almost 98% of computers have Adobe Flash, which means almost everyone is exposed to Zombie Cookies. Some people feel that if you delete or block a cookie, it should stay deleted. But since Zombie cookies are not affected by regular deletion of cookies, people consider sites that use them to be breaching their privacy. A huge lawsuit was filed against Clearspring and affiliated sites owned by Walt Disney Internet Group, Warner Bros and others. It said that Adobe Flash cookies, a type of zombie cookie, are planted to "track Plaintiffs and Class Members that visited non-Clearspring Flash Cookie Affiliates websites by having their online transmissions intercepted, without notice or consent".
  • 10. How to kill them? Before: You had to uninstall Adobe Flash, and re-install it. Now: Go to Adobe’s webpage and set controls on the Global Privacy Settings page (Google this for more details). . If you use Firefox you can get rid of Flash cookies - including zombie cookies- by using theBetterPrivacy add-on.
  • 11. That’s it Thank you.