Tag: technology

  • Tracking and Privacy in Over-the-Top (OTT) Streaming Devices

    Tracking and Privacy in Over-the-Top (OTT) Streaming Devices

    Source: Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices by Mohajeri Moghaddam et al. (CCS ‘19)

    Main Themes:

    • Pervasive Tracking in OTT Streaming Devices: The study reveals widespread tracking practices within Over-the-Top (OTT) streaming devices like Roku and Amazon Fire TV. Trackers collect and transmit user data, often without explicit consent or effective countermeasures.
    • Identifier and Information Leakage: OTT channels leak sensitive user information, including persistent identifiers like MAC addresses, serial numbers, and WiFi SSIDs, as well as video viewing preferences, to numerous tracking domains.
    • Ineffectiveness of Privacy Controls: Built-in privacy controls like “Limit Ad Tracking” (Roku) and “Disable Interest-based Ads” (Amazon) are largely ineffective in preventing data collection and transmission to tracking domains.
    • Security Vulnerabilities in Remote Control APIs: Vulnerabilities in local remote control APIs expose OTT devices to attacks by malicious web scripts, potentially allowing unauthorized access to device information and control over functionalities.

    Key Findings:

    • Prevalence of Trackers: Tracking domains were found in 69% of Roku channels and 89% of Amazon Fire TV channels studied. Google and Facebook tracking services are highly prevalent, mirroring similar findings on web and mobile platforms.
    • Top Trackers: The most prevalent trackers included doubleclick.net (Google) and google-analytics.com on Roku, and amazon-adsystem.com and crashlytics.com on Amazon Fire TV.
    • Leakage of Persistent Identifiers: A significant number of channels were found to leak persistent identifiers like AD IDs, MAC addresses, and serial numbers, undermining the effectiveness of resetting advertising IDs as a privacy measure. Quote: “Moreover, widespread collection of persistent device identifiers like MAC addresses and serial numbers disables one of the few defenses available to users: resetting their advertising IDs.”
    • Video Title Leakage: Tracking domains were observed receiving information about the titles of videos being watched, revealing user viewing habits. Quote: “We found 9 channels on Roku and 14 channels on the Fire TV … that leaked the title of the video to a tracking domain.”
    • Ineffective Privacy Settings: While “Limit Ad Tracking” on Roku eliminated AD ID leaks, it did not reduce the number of trackers contacted. Similarly, “Disable Interest-based Ads” on Amazon only reduced data collection by Amazon’s own advertising system. Quote: “Our data, however, reveals that even when the privacy option is enabled, there are a number of other identifiers that can be used to track users, bypassing the privacy protections built into these platforms”
    • DNS Rebinding Vulnerability (Roku): Roku’s External Control API was found to be vulnerable to DNS rebinding attacks, allowing malicious web scripts to collect sensitive data, install/uninstall channels, and even geolocate users.

    Recommendations:

    • Implement stronger privacy controls, akin to “Incognito Mode” in web browsers, to limit data collection and prevent cross-profile tracking.
    • Provide mechanisms for users to monitor their network traffic, enabling transparency and analysis of channel behavior.
    • Enhance security of local APIs to mitigate risks of unauthorized access and control.
    • Regulators should use the tools developed in this study to inspect channels and enforce privacy regulations in the OTT ecosystem.

    Conclusion:

    This research underscores the urgent need for improved privacy and security measures within the OTT streaming device ecosystem. Current practices expose users to extensive tracking and data leakage, often without their knowledge or consent. Stronger privacy controls, transparent data collection practices, and robust security measures are crucial to protect user privacy and build trust in these platforms.

  • Securing Your Home Router

    Securing Your Home Router

    In today’s hyper-connected world, your home router is the gateway to the digital realm. It connects all your devices to the internet, making it a critical piece of your home’s cybersecurity puzzle. Unfortunately, it’s often overlooked, leaving a door wide open for cyber threats. Below, I’ll explore some essential steps to secure your router and safeguard your home network.

    1. Use a Strong, Unique Password

    The default admin passwords that come with routers are easy targets for attackers. Changing your router’s admin credentials to a strong, unique password is your first line of defense. Consider using a mix of uppercase and lowercase letters, numbers, and special characters. Password managers can help generate and store secure passwords if needed.

    2. Disable Remote Management

    Remote management allows you to access your router from anywhere, but it also opens the door for attackers. Unless you absolutely need this feature (and most home users don’t), it’s best to disable it. This minimizes the attack surface of your network.

    3. Segregate IoT Devices

    The Internet of Things (IoT) has revolutionized our lives, but many IoT devices lack robust security measures. Segregate these devices by setting up a separate network for them. Many modern routers, like the Synology routers I use, allow you to create multiple SSIDs, ensuring your primary devices are shielded from potential IoT vulnerabilities.

    4. Avoid Universal Plug and Play (uPNP)

    While uPNP is convenient for gaming consoles and other devices to automatically configure port forwarding, it’s also a security risk. uPNP can allow malware to manipulate your router’s settings. Disabling this feature adds another layer of security to your network.

    5. Skip WPS (Wi-Fi Protected Setup)

    WPS was designed to simplify device connections, but it has known vulnerabilities that can be exploited by attackers. Disable WPS and stick to manually connecting devices to your network with a strong password.

    6. Keep Firmware Updated

    Router manufacturers regularly release firmware updates to patch security vulnerabilities and enhance functionality. Check for updates frequently or enable automatic updates if your router supports it. Staying updated ensures you’re protected against the latest threats.

    7. Use a Guest Network

    Instead of sharing your primary network password with visitors, set up a guest network. This keeps their devices isolated from your main devices and prevents accidental access to sensitive resources. Most routers make it easy to create and manage guest networks, adding convenience and security.

    Final Thoughts

    Your router is more than just a device that connects you to the internet—it’s the gatekeeper of your digital life. By taking proactive steps to secure it, you can significantly reduce your risk of cyber threats. Whether it’s changing passwords, disabling risky features, or updating firmware, every action contributes to a safer home network.

    Remember, the strength of your network’s security starts with you. Don’t wait until it’s too late—secure your router today and enjoy peace of mind in the digital age.