SlideShare a Scribd company logo
1 of 11
Zombie cookies Abdul Rahman Al-Mudaiheem
Table of content What are Zombie Cookies?  Differences between them & regular cookies. How do they work exactly?  Who used them? Purposes of using them.  Privacy Breach. How to kill them?
What Are zombie cookies? They are cookies that rise from the dead come back to life after you kill delete them. It was first identified by UC Berkley They noticed that they were deleting cookies, but they kept coming back over and over again.  No amount of deleting them would kill them.  Many people have absolutely no idea what a zombie cookie is, or that they even exist.  Until a massive lawsuit in 2009, which targeted some of the biggest names on the web. Because of breach of privacy (More on that later).
Differences between them & regular cookies.
How do they work exactly? What you think happens:  You visit a website.  They plant browser Cookies. You visit the website again, and they retrieve those cookies.  You can block them or delete them. And that’s that.
How do they work exactly? What REALLY happens (in some cases):  You visit a website.  They plant browser Cookies AND Adobe Flash cookies.  You block or delete regular cookies. Doesn’t matter! You visit the website again, they check for regular cookies. No luck?  They check for Adobe Flash cookies, which are EXACTLY the same, if not even more detailed (remember 4kb vs. 100kb) So in a sense, you deleting or blocking browser cookies doesn’t matter. Because Zombie cookies are there.
Who used them? that is just for starters. It isn’t even the tip of the iceberg when it comes to who is hiding zombie cookies on your computer.
Purposes of using them. Marketing Research  Tracking personal browsing habits.  Since Zombie cookies have a bigger size, they store more, detailed information about users’ behavior.  Remember unique visitors.  Preferences, such as video volume or page layout, are saved, no matter what browser you use.  When a site bans a user, he/she will still be banned even if you delete browser cookies or use different browsers.
Privacy Breach Fact: almost 98% of computers have Adobe Flash, which means almost everyone is exposed to Zombie Cookies. Some people feel that if you delete or block a cookie, it should stay deleted.  But since Zombie cookies are not affected by regular deletion of cookies, people consider sites that use them to be breaching their privacy.  A huge lawsuit was filed against Clearspring and affiliated sites owned by Walt Disney Internet Group, Warner Bros and others. It said that Adobe Flash cookies, a type of zombie cookie, are planted to "track Plaintiffs and Class Members that visited non-Clearspring Flash Cookie Affiliates websites by having their online transmissions intercepted, without notice or consent".
How to kill them? Before:  You had to uninstall Adobe Flash, and re-install it.  Now:  Go to Adobe’s webpage and set controls on the Global Privacy Settings page (Google this for more details). . If you use Firefox you can get rid of Flash cookies - including zombie cookies- by using theBetterPrivacy add-on.
That’s it  Thank you.

More Related Content

Similar to Zombie Cookies

online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Sis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanSis fri 1030 aaron goldman
Sis fri 1030 aaron goldman
MediaPost
 

Similar to Zombie Cookies (20)

online spying tools
online spying toolsonline spying tools
online spying tools
 
How to remove cookies[4254]
How to remove cookies[4254]How to remove cookies[4254]
How to remove cookies[4254]
 
EU cookie law - solutions
EU cookie law - solutionsEU cookie law - solutions
EU cookie law - solutions
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Cookie presentation
Cookie presentationCookie presentation
Cookie presentation
 
Cookie management
Cookie managementCookie management
Cookie management
 
Understanding the law on cookies
Understanding the law on cookiesUnderstanding the law on cookies
Understanding the law on cookies
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
First and Third-Party Cookies
First and Third-Party CookiesFirst and Third-Party Cookies
First and Third-Party Cookies
 
What is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav SoodWhat is digital marketing by prof. (Dr.) Gaurav Sood
What is digital marketing by prof. (Dr.) Gaurav Sood
 
Jupitersupport blog
Jupitersupport blogJupitersupport blog
Jupitersupport blog
 
Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5 Online Privacy Eric Zhu T5
Online Privacy Eric Zhu T5
 
Do not track me
Do not track meDo not track me
Do not track me
 
Google Analytics Cookies Tracking
Google Analytics Cookies TrackingGoogle Analytics Cookies Tracking
Google Analytics Cookies Tracking
 
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
IWMW 2001: Practical Web Strategies: Conflict, Ethics and Your Web Site (5)
 
How to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-upHow to Remove adultcameras.info Pop-up
How to Remove adultcameras.info Pop-up
 
Behavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trendBehavioral tracking : Today's internet trend
Behavioral tracking : Today's internet trend
 
Cookies: A brief Introduction
Cookies: A brief IntroductionCookies: A brief Introduction
Cookies: A brief Introduction
 
Cybersecurity additional activities
Cybersecurity additional activitiesCybersecurity additional activities
Cybersecurity additional activities
 
Sis fri 1030 aaron goldman
Sis fri 1030 aaron goldmanSis fri 1030 aaron goldman
Sis fri 1030 aaron goldman
 

Recently uploaded

Recently uploaded (20)

ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 

Zombie Cookies

  • 1. Zombie cookies Abdul Rahman Al-Mudaiheem
  • 2. Table of content What are Zombie Cookies? Differences between them & regular cookies. How do they work exactly? Who used them? Purposes of using them. Privacy Breach. How to kill them?
  • 3. What Are zombie cookies? They are cookies that rise from the dead come back to life after you kill delete them. It was first identified by UC Berkley They noticed that they were deleting cookies, but they kept coming back over and over again. No amount of deleting them would kill them. Many people have absolutely no idea what a zombie cookie is, or that they even exist. Until a massive lawsuit in 2009, which targeted some of the biggest names on the web. Because of breach of privacy (More on that later).
  • 4. Differences between them & regular cookies.
  • 5. How do they work exactly? What you think happens: You visit a website. They plant browser Cookies. You visit the website again, and they retrieve those cookies. You can block them or delete them. And that’s that.
  • 6. How do they work exactly? What REALLY happens (in some cases): You visit a website. They plant browser Cookies AND Adobe Flash cookies. You block or delete regular cookies. Doesn’t matter! You visit the website again, they check for regular cookies. No luck? They check for Adobe Flash cookies, which are EXACTLY the same, if not even more detailed (remember 4kb vs. 100kb) So in a sense, you deleting or blocking browser cookies doesn’t matter. Because Zombie cookies are there.
  • 7. Who used them? that is just for starters. It isn’t even the tip of the iceberg when it comes to who is hiding zombie cookies on your computer.
  • 8. Purposes of using them. Marketing Research Tracking personal browsing habits. Since Zombie cookies have a bigger size, they store more, detailed information about users’ behavior. Remember unique visitors. Preferences, such as video volume or page layout, are saved, no matter what browser you use. When a site bans a user, he/she will still be banned even if you delete browser cookies or use different browsers.
  • 9. Privacy Breach Fact: almost 98% of computers have Adobe Flash, which means almost everyone is exposed to Zombie Cookies. Some people feel that if you delete or block a cookie, it should stay deleted. But since Zombie cookies are not affected by regular deletion of cookies, people consider sites that use them to be breaching their privacy. A huge lawsuit was filed against Clearspring and affiliated sites owned by Walt Disney Internet Group, Warner Bros and others. It said that Adobe Flash cookies, a type of zombie cookie, are planted to "track Plaintiffs and Class Members that visited non-Clearspring Flash Cookie Affiliates websites by having their online transmissions intercepted, without notice or consent".
  • 10. How to kill them? Before: You had to uninstall Adobe Flash, and re-install it. Now: Go to Adobe’s webpage and set controls on the Global Privacy Settings page (Google this for more details). . If you use Firefox you can get rid of Flash cookies - including zombie cookies- by using theBetterPrivacy add-on.
  • 11. That’s it Thank you.