SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Zombie cookies Abdul Rahman Al-Mudaiheem
Table of content What are Zombie Cookies?  Differences between them & regular cookies. How do they work exactly?  Who used them? Purposes of using them.  Privacy Breach. How to kill them?
What Are zombie cookies? They are cookies that rise from the dead come back to life after you kill delete them. It was first identified by UC Berkley They noticed that they were deleting cookies, but they kept coming back over and over again.  No amount of deleting them would kill them.  Many people have absolutely no idea what a zombie cookie is, or that they even exist.  Until a massive lawsuit in 2009, which targeted some of the biggest names on the web. Because of breach of privacy (More on that later).
Differences between them & regular cookies.
How do they work exactly? What you think happens:  You visit a website.  They plant browser Cookies. You visit the website again, and they retrieve those cookies.  You can block them or delete them. And that’s that.
How do they work exactly? What REALLY happens (in some cases):  You visit a website.  They plant browser Cookies AND Adobe Flash cookies.  You block or delete regular cookies. Doesn’t matter! You visit the website again, they check for regular cookies. No luck?  They check for Adobe Flash cookies, which are EXACTLY the same, if not even more detailed (remember 4kb vs. 100kb) So in a sense, you deleting or blocking browser cookies doesn’t matter. Because Zombie cookies are there.
Who used them? that is just for starters. It isn’t even the tip of the iceberg when it comes to who is hiding zombie cookies on your computer.
Purposes of using them. Marketing Research  Tracking personal browsing habits.  Since Zombie cookies have a bigger size, they store more, detailed information about users’ behavior.  Remember unique visitors.  Preferences, such as video volume or page layout, are saved, no matter what browser you use.  When a site bans a user, he/she will still be banned even if you delete browser cookies or use different browsers.
Privacy Breach Fact: almost 98% of computers have Adobe Flash, which means almost everyone is exposed to Zombie Cookies. Some people feel that if you delete or block a cookie, it should stay deleted.  But since Zombie cookies are not affected by regular deletion of cookies, people consider sites that use them to be breaching their privacy.  A huge lawsuit was filed against Clearspring and affiliated sites owned by Walt Disney Internet Group, Warner Bros and others. It said that Adobe Flash cookies, a type of zombie cookie, are planted to "track Plaintiffs and Class Members that visited non-Clearspring Flash Cookie Affiliates websites by having their online transmissions intercepted, without notice or consent".
How to kill them? Before:  You had to uninstall Adobe Flash, and re-install it.  Now:  Go to Adobe’s webpage and set controls on the Global Privacy Settings page (Google this for more details). . If you use Firefox you can get rid of Flash cookies - including zombie cookies- by using theBetterPrivacy add-on.
That’s it  Thank you.

Weitere ähnliche Inhalte

Ähnlich wie Zombie Cookies

online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]yvonneschnurr
 
EU cookie law - solutions
EU cookie law - solutionsEU cookie law - solutions
EU cookie law - solutionssamie19
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentationMatthew Momney
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party CookiesWill Clayton
 
What is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodWhat is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodGaurav Sood
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blogMathew peter
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 EricZhuZhengyi
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies TrackingAK DigiHub
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW
 
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upHow to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upAdoniscooper
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendKanu Priya
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief IntroductionHTS Hosting
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activitiesYumonomics
 
Sis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanSis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanMediaPost
 

Ähnlich wie Zombie Cookies (20)

online spying tools
online spying toolsonline spying tools
online spying tools
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
EU cookie law - solutions
EU cookie law - solutionsEU cookie law - solutions
EU cookie law - solutions
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookie presentation
Cookie presentationCookie presentation
Cookie presentation
 
Cookie management
Cookie managementCookie management
Cookie management
 
Understanding the law on cookies
Understanding the law on cookiesUnderstanding the law on cookies
Understanding the law on cookies
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
 
What is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodWhat is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav Sood
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blog
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Do not track me
Do not track meDo not track me
Do not track me
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
 
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upHow to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-up
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trend
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Sis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanSis fri 1030 aaron goldman
Sis fri 1030 aaron goldman
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Zombie Cookies

  • 1. Zombie cookies Abdul Rahman Al-Mudaiheem
  • 2. Table of content What are Zombie Cookies? Differences between them & regular cookies. How do they work exactly? Who used them? Purposes of using them. Privacy Breach. How to kill them?
  • 3. What Are zombie cookies? They are cookies that rise from the dead come back to life after you kill delete them. It was first identified by UC Berkley They noticed that they were deleting cookies, but they kept coming back over and over again. No amount of deleting them would kill them. Many people have absolutely no idea what a zombie cookie is, or that they even exist. Until a massive lawsuit in 2009, which targeted some of the biggest names on the web. Because of breach of privacy (More on that later).
  • 4. Differences between them & regular cookies.
  • 5. How do they work exactly? What you think happens: You visit a website. They plant browser Cookies. You visit the website again, and they retrieve those cookies. You can block them or delete them. And that’s that.
  • 6. How do they work exactly? What REALLY happens (in some cases): You visit a website. They plant browser Cookies AND Adobe Flash cookies. You block or delete regular cookies. Doesn’t matter! You visit the website again, they check for regular cookies. No luck? They check for Adobe Flash cookies, which are EXACTLY the same, if not even more detailed (remember 4kb vs. 100kb) So in a sense, you deleting or blocking browser cookies doesn’t matter. Because Zombie cookies are there.
  • 7. Who used them? that is just for starters. It isn’t even the tip of the iceberg when it comes to who is hiding zombie cookies on your computer.
  • 8. Purposes of using them. Marketing Research Tracking personal browsing habits. Since Zombie cookies have a bigger size, they store more, detailed information about users’ behavior. Remember unique visitors. Preferences, such as video volume or page layout, are saved, no matter what browser you use. When a site bans a user, he/she will still be banned even if you delete browser cookies or use different browsers.
  • 9. Privacy Breach Fact: almost 98% of computers have Adobe Flash, which means almost everyone is exposed to Zombie Cookies. Some people feel that if you delete or block a cookie, it should stay deleted. But since Zombie cookies are not affected by regular deletion of cookies, people consider sites that use them to be breaching their privacy. A huge lawsuit was filed against Clearspring and affiliated sites owned by Walt Disney Internet Group, Warner Bros and others. It said that Adobe Flash cookies, a type of zombie cookie, are planted to "track Plaintiffs and Class Members that visited non-Clearspring Flash Cookie Affiliates websites by having their online transmissions intercepted, without notice or consent".
  • 10. How to kill them? Before: You had to uninstall Adobe Flash, and re-install it. Now: Go to Adobe’s webpage and set controls on the Global Privacy Settings page (Google this for more details). . If you use Firefox you can get rid of Flash cookies - including zombie cookies- by using theBetterPrivacy add-on.
  • 11. That’s it Thank you.