Ad targeters are pulling data from your browser s password manager
Alarming trend shows how users are being targeted
For those who are less tech savvy – as well as those who are familiar with technology – we should give praise to those guys, girls and researchers residing in prestigious varsities in the country.
Princeton University s researchers are such a bunch. It is mostly those Professors who get to the bottom of issues concerning our online security .
One such security issue is the one below explained.
Most web browser now come with a password manager tool, a lightweight version of the same service offered by plugins like Last Pass and 1 Password.
Do you have sufficient confidence to entrust an unknown company with our passwords ? Why should I give out my passwords to someone to store it for me when I can do the same easy and without the huge security risk.
INTUITION IS POSSIBLY THE STRONGEST FACTOR TO KEEP YOU AWAY FROM DANGER
( LEARNED THAT YEARS AGO )
According to new research from Princeton s Center for Information Technology Policy, those password managers are being exploited ( here it goes ) as a way to track users from site to site. Scripts are being used to extract data.
TAKE THIS FOR STARTERS
The scripts work by injecting invisible login forms in the background of the web page and scooping up whatever the browsers auto fill into the available slots.
The information received can then be used as a persistent ID to track users from page to page, a potentially valuable tool in targeting advertising.
credit: the verge : https://www.theverge.com/2017/12/30/16829804/browser-password-manager-adthink-princeton-research