As third party cookies become less available, tracking will shift further towards fingerprinting and other forms of covert cross-site tracking.
While it is infeasible to fundamentally remove or change usage of IP addresses or web APIs which could be used for fingerprinting, it is possible to curtail access to these surfaces in scenarios that are sensitive for cross-site tracking.
Browsers have been developing and shipping mitigations using tracker lists as a pragmatic path forward -- spanning IP proxying and active fingerprinting mitigations. There are some common challenges and potential opportunities across browsers.
Session description
Link to slides
Link to minutes
As third party cookies become less available, tracking will shift further towards fingerprinting and other forms of covert cross-site tracking.
While it is infeasible to fundamentally remove or change usage of IP addresses or web APIs which could be used for fingerprinting, it is possible to curtail access to these surfaces in scenarios that are sensitive for cross-site tracking.
Browsers have been developing and shipping mitigations using tracker lists as a pragmatic path forward -- spanning IP proxying and active fingerprinting mitigations. There are some common challenges and potential opportunities across browsers.
Session goal
Discuss challenges & evolving mitigations, identify collaboration opportunities
Additional session chairs (Optional)
No response
IRC channel (Optional)
anti-fingerprinting
Who can attend
Restricted to TPAC registrants
Session duration
60 minutes (Default)
Other sessions where we should avoid scheduling conflicts (Optional)
62
Estimated number of in-person attendees
Don't know (Default)
Instructions for meeting planners (Optional)
No response
Agenda, minutes, slides, etc. (Optional)