Fingerprints:

The internet today is a wild place. Everyday you here about more and more people getting scammed or there information stolen. Which can leave us wondering what websites can be trusted? The answer to this might be simplar than you think and has been looking at you from the search bar all along. For years most websites used HTTP or Hypertext Transfer Protocol for transmitting hypermedia documents for example html which is what this website is made out of. However HTTP had a major flaw that being unwanted parties could access the website and steal data such as your credit card information or other important data. This led to the eventual creation of HTTPS or Hypertext Transfer Protocol Secure this was essentially HTTP however had the primary purpose to keep others from eavsdropping on sensative information as well as to have the connection of the user to the web authenticated, encrypted and secure. This was to protect your data from MITM which stands for Man In The Middle this is a general term for when a perpetrator positions himself in a conversation between a user and an application this presents the risk of leaked information as the perpetratorcan steal important information such as credit card details or social security numbers.

This increase in personal security was revolutionary for the individual as they could now safely browse the web free of the fear that there information might be stolen. Businesses and Schools however were not so keen on these changes as they now lacked much of the information they once possesed that being the details of employees/students internet usage. Thus, to counteract this "Going Dark Problem" they started using a HTTPS proxy appliance. This new technology circumvents security and privacy of a web application. This begs the question do these businesses and schools have a right to eavsdrop on your communications. Which sadly the answer is yes. If you're doing anything they would consider suspicious they can access your internet data. However for the average person it wouldn't take much for them to get your information if they needed it. Governments and Police can easily get copies of your online activity without needing a warrant. Not to mention your ISP or Internet Service Providercan track if you go to suspicious websites then alert the authorities. You can however bypass the tracking of an ISP with a VPN or Virtual Private Network which will secure all your data and assures it cannot be tracked.

So how do your businesses look into you internet usage. Well most of the time they use a SSL Proxy Appliance which decrypts inspects and judges your content. So now you might be wondering how can I prevent this. Well sorry to tell you but It can't be prevented. However it can be detected. You see to prevent security and privacy a third party who we can trust has told us that our encrypted traffic is going to the right location. They do this through CA's or Certificate Authorities to whom a websites reveal their identity in the real world usind documentation. When a website has thoroughly proven their existence the CA will approve them by giving them a site security certificate putting their own reputation by doing so. So if the website certificate presented to you will be different from the one you get when opening the site from a personal device. If the public keys and/or certificate fingerprints of the certificates don't match then there is most likely SSL interception occuring. You see if anyone examining a website can create a hash. Whats a hash you might be wondering? Well hashes are complex mathematical algorithm which carefully process every single bit of what they obtain and if even one part inside the certificate is changed, half the fingerprints hash bits will change esentiall creating a new fingerprint no matter how small. Now this system isn't perfect and is sometimes subject to errors such as a false-positives when multiple unique visitors are associated with the same fingerprint. As well as false-negatives when one visitor over a number of visits is assigned different fingerprints. So In conclusion there are several ways the internet has tried to become more secure throughout the years and although many have made it a more safe place. There are still ways to bypass these security measures which can't be prevented but can be detected.


Sources:

Gibson, S., & CORPORATION, G. R. (n.d.). Grc | SSL tls HTTPS web server certificate fingerprints. Home of Gibson Research Corporation .https://www.grc.com/fingerprints.htm#top

How can I detect HTTPS inspection? (n.d.). Information Security Stack Exchange. https://security.stackexchange.com/questions/119364/how-can-i-detect-https-inspection

What is MITM (Man in the middle) attack | Imperva. (2019, December 29). Learning Center. https://www.imperva.com/learn/application-security/man-in-the-middle-attack-mitm/

Can your ISP see your browsing history? Here's what you need to know. (2022, June 17). Android Authority. https://www.androidauthority.com/isp-tracking-1167088/

What is browser fingerprinting: A beginner's guide - Fingerprint. (n.d.). Fingerprint Pro - Formerly FingerprintJS - Device fingerprinting API. https://fingerprint.com/blog/what-is-browser-fingerprinting/#:~:text=False-positive%3A%20multiple%20unique%20visitors%20are%20associated%20with%20the,combination%20of%20signals%20that%20balance%20uniqueness%20and%20stability

Use fingerprints to determine the authenticity of an internet website. (2013, July 27). gHacks Technology News. https://www.ghacks.net/2013/07/27/use-fingerprints-to-determine-the-authenticity-of-an-internet-website/

Get In Contact
  • Connect With Me: LinkedIn
  • Contact me: jmdungan@gmail.com
  • Contact me: Visit my Github
  • My Resume: Come take a look!