Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Free courses from frontend to fullstack and AI
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore how customized ad blocker configurations can paradoxically compromise user privacy through browser fingerprinting in this 15-minute conference presentation from USENIX Security '25. Learn about the counter-intuitive privacy risks that arise when users modify ad-blocker filter-list selections to enhance their protection against web tracking. Discover three novel scriptless attacks developed by researchers from EPFL, CISPA Helmholtz Center, and Max-Planck Institute that can evade state-of-the-art fingerprinting detectors and mitigations. Examine how these attacks achieve 84% accuracy in identifying filter lists, generate stable fingerprints with 0.72 normalized entropy, and reduce user anonymity sets to a median of just 48 users using only 45 rules from a pool of 577,000. Understand the implications of cookie-less tracking techniques and browser fingerprinting methods that circumvent popular privacy-enhancing web extensions. Gain insights into the research methodology that quantifies fingerprintability risks and receive practical recommendations and precautionary measures for users, developers, and other stakeholders in the privacy ecosystem.
Syllabus
USENIX Security '25 - Double-Edged Shield: On the Fingerprintability of Customized Ad Blockers
Taught by
USENIX