If you’ve ever wondered how the world of the cookie clicker works, now you know.
In an interview with the New York Times published on Thursday, The Hacker Project CEO Matthew Green discussed how the company’s researchers are able to find and analyze millions of cookies per day and how the industry is slowly shifting toward more efficient ways to analyze and report on the information they contain.
“There are thousands of cookies on your browser that you don’t even know exist,” Green said.
“The cookie clickers are just like that.”
Cookie clickers use a technique called “network fingerprinting,” in which the browser collects information on your device to identify where you are visiting.
These cookies can be very powerful, as the company explained in a blog post about its latest research.
“The network fingerprinting process, or fingerprinting, is an important part of cookie click-based malware.
We were able to track and track down more than 30,000 unique user IDs in one day alone, including user names, passwords, email addresses, phone numbers, and IP addresses, among other details.”
It’s important to note that these network fingerprinters aren’t as accurate as cookies placed by a browser’s privacy settings, Green said, but they do provide a better estimate of the size of the network, which is important in the event that someone is trying to compromise a company’s systems.”
We’ve been able to identify some of these people and their cookies are being tracked by our network fingerprinter and then we can figure out where those cookies are coming from and what the malicious activities they are engaging in are.”
It’s important to note that these network fingerprinters aren’t as accurate as cookies placed by a browser’s privacy settings, Green said, but they do provide a better estimate of the size of the network, which is important in the event that someone is trying to compromise a company’s systems.
The company’s network fingerprint analysis is based on the fact that, as a rule, people who have the most cookies have the highest network traffic.
However, if a person is browsing from a different IP address than they typically do, they’re also more likely to be connected to a malicious network.
“In general, if you are using a browser that is being used for browsing or doing some sort of targeted activity, you’re more likely than someone that is using a different browser to have a malicious cookie.
And when you do have a cookie, that cookie is probably going to be targeted at that person,” Green explained.”
So if you have the largest amount of cookies, you are more likely the person that has the malicious cookie,” he added.
Green explained that network fingerprint data is a good way to gauge how much data the browser is collecting, and how much information it is storing.
For example, if the user was surfing from a specific IP address, they may have a larger amount of network traffic on their devices, Green noted.
“If you look at the network traffic, the number of network requests, the amount of traffic, that’s the traffic that the browser was collecting,” Green told the Times.
“So if it’s a large amount of the traffic, then the browser has probably been collecting a lot of network resources.”
But, Green pointed out, it’s important not to take network fingerprint information too literally.
“Network fingerprinting is really not that accurate because the network is not the only source of network activity,” he said.
“It’s the network activity that you see that gives you the idea of the amount and size of network.”
When asked how network fingerprinted cookies can identify users, Green responded: “It’s a pretty simple thing.
We don’t have a lot to go on.”
He also pointed out that network fingerprints can be a bit of a mixed bag.
“Some of the things that we do in network fingerprint detection, like we have with network fingerprint monitoring, it will identify a lot more data than if it were just network traffic,” Green admitted.
“But then again, if it was just network activity and we didn’t have any network fingerprint, it would be pretty easy to guess who the hacker was.”
Cortana, the privacy company, has recently been using network fingerprint technology to identify criminals who steal data from their devices.
Green said that the company is now seeing a lot less network activity on its devices, and is using fingerprinting to identify individuals that are likely to have been targeted.
“We’ve had very good results on the device itself,” he explained.
“There’s very little network activity, so we’re not really tracking who is visiting what sites or what they are doing.
We’re just looking for information that we can use to determine that person’s identity.”
In the future, Green also hopes to find ways to use network fingerprint tracking to identify people that have malicious behavior on their systems, and to identify the people who are most likely to commit crimes.