Data Exfiltration by Hotjar Revisited

09/20/2023
by   Libor Polčák, et al.
0

Session replay scripts allow website owners to record the interaction of each web site visitor and aggregate the interaction to reveal the interests and problems of the visitors. However, previous research identified such techniques as privacy intrusive. This position paper updates the information on data collection by Hotjar. It revisits the previous findings to detect and describe the changes. The default policy to gather inputs changed; the recording script gathers only information from explicitly allowed input elements. Nevertheless, Hotjar does record content reflecting users' behaviour outside input HTML elements. Even though we propose changes that would prevent the leakage of the reflected content, we argue that such changes will most likely not appear in practice. The paper discusses improvements in handling TLS. Not only do web page operators interact with Hotjar through encrypted connections, but Hotjar scripts do not work on sites not protected by TLS. Hotjar respects the Do Not Track signal; however, users need to connect to Hotjar even in the presence of the Do Not Track setting. Worse, malicious web operators can trick Hotjar into recording sessions of users with the active Do Not Track setting. Finally, we propose and motivate the extension of GDPR Art. 25 obligations to processors.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/03/2018

An Automated Approach to Auditing Disclosure of Third-Party Data Collection in Website Privacy Policies

A dominant regulatory model for web privacy is "notice and choice". In t...
research
04/04/2022

JShelter: Give Me My Browser Back

The Web is used daily by billions. Even so, users are not protected from...
research
05/22/2018

Optimal Record and Replay under Causal Consistency

We investigate the minimum record needed to replay executions of process...
research
04/28/2020

A Retrospective Analysis of User Exposure to (Illicit) Cryptocurrency Mining on the Web

In late 2017, a sudden proliferation of malicious JavaScript was reporte...
research
02/07/2019

Enhanced Performance for the encrypted Web through TLS Resumption across Hostnames

TLS can resume previous connections via abbreviated resumption handshake...
research
04/24/2018

WhoTracks.Me: Monitoring the online tracking landscape at scale

We present the largest and longest measurement of online tracking to dat...
research
08/09/2022

Understanding User Awareness and Behaviors Concerning Encrypted DNS Settings

Recent developments to encrypt the Domain Name System (DNS) have resulte...

Please sign up or login with your details

Forgot password? Click here to reset