Skip to content

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
    • Help
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
5
5218240
  • Project
    • Project
    • Details
    • Activity
    • Cycle Analytics
  • Issues 2
    • Issues 2
    • List
    • Boards
    • Labels
    • Milestones
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Create a new issue
  • Jobs
  • Issue Boards
  • Kristine Berrios
  • 5218240
  • Issues
  • #1

Closed
Open
Opened Oct 12, 2025 by Kristine Berrios@kristineberrio
  • Report abuse
  • New issue
Report abuse New issue

Is it Suitable for Large-scale Tracking?


We describe a tracking approach for Linux devices, exploiting a brand new TCP source port generation mechanism just lately launched to the Linux kernel. This mechanism is based on an algorithm, iTagPro standardized in RFC 6056, for boosting safety by higher randomizing port selection. Our technique detects collisions in a hash operate used in the stated algorithm, primarily based on sampling TCP source ports generated in an attacker-prescribed method. These hash collisions rely solely on a per-machine key, and thus the set of collisions types a system ID that permits monitoring gadgets across browsers, ItagPro browser privacy modes, containers, and IPv4/IPv6 networks (together with some VPNs). It might distinguish amongst units with an identical hardware and iTagPro website software, and lasts till the gadget restarts. We carried out this system and then tested it using monitoring servers in two different locations and with Linux units on various networks. We additionally examined it on an Android device that we patched to introduce the new port choice algorithm.


The tracking method works in real-life situations, and we report detailed findings about it, including its dwell time, ItagPro scalability, and success fee in numerous network types. We worked with the Linux kernel workforce to mitigate the exploit, resulting in a security patch launched in May 2022 to the Linux kernel, and we offer recommendations for higher securing the port selection algorithm within the paper. Online browser-based mostly device tracking is a widespread follow, employed by many Internet web sites and advertisers. It permits identifying customers throughout a number of sessions and web sites on the internet. "fraud detection, protection against account hijacking, anti-bot and anti-scraping services, enterprise safety management, protection against DDOS attacks, actual-time targeted advertising, marketing campaign measurement, reaching prospects throughout gadgets, and limiting the number of accesses to services". Device tracking is commonly performed to personalize adverts or for surveillance functions. Three occasion cookies. However, these days, iTagPro customers are extra conscious of the cookies’ privacy hazards, and in order that they use multiple browsers, browser privateness mode, and cookie deletion to avoid such tracking.


Trackers are, subsequently, on the look for new tracking technologies, notably ones that can work throughout sites and across browsers and privateness modes, thereby breaking the isolation the latter try to provide. Probably the most alarming affect of device tracking is the degradation of person privacy - when a user’s system could be tracked across community adjustments, completely different browsers, VPNs, and browser privacy modes. This means that users who browse to one site with some id (e.g., consumer account), then browse to a different site, from another browser, one other community (or VPN), and maybe at one other time altogether, using a totally totally different and unrelated second identity, may still have the 2 identities linked. Often, gadget monitoring strategies are utilized in a clandestine method, with out the user’s awareness and without acquiring the user’s explicit consent. This motivates researchers to understand iTagPro product the challenges of device monitoring, discover new tracking methods that can be used with out consent, and work with the relevant software program vendors to get rid of such techniques and increase awareness of these new sorts of attacks.


In this paper, we current a brand new browser-primarily based tracking approach that supports monitoring across IPv4 and ItagPro IPv6 networks, itagpro bluetooth browsers, VPNs, and browser privateness modes. Our monitoring method can provide as much as 128 bits of entropy for the gadget ID (in the Linux implementation) and requires negligible CPU and RAM assets for iTagPro smart device its operation. Our technique uses normal web applied sciences such as Javascript, WebRTC Turn (in Chrome), and XHR (in Firefox). 1-get together tracking server (i.e., iTagPro website there isn't any reliance on common infrastructure among the monitoring web sites). The tracking server then calculates a gadget ID. This ID relies on kernel data. Therefore, the same gadget ID is calculated by any site that runs the same logic, regardless of the community from which the tracked gadget arrives, or the browser used. The tracking method is based on observing the TCP supply port numbers generated by the device’s TCP/IP stack, ItagPro which is implemented in the working system kernel.

Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
0
Labels
None
Assign labels
  • View project labels
Reference: kristineberrio/5218240#1