Ad-blockers begat ad-blocker-blockers, which begat ad-blocker-blocker-blockers, with no end in sight.
But a quartet of distinguished security researchers from Princeton and Stanford say that the blockers will win in the end -- publishers will not be able to make their ads unblockable, nor will they be able to detect whether their ads were blocked.
The researchers start from the assumption that advertisers and publishers will have to put up with some constraints on their tactics, lest they be accused of deceptive advertising practices. They also leave an open question of whether publishers will be able to successfully sue ad-blocking companies -- which would mean all bets are off.
In this paper we have presented an approach to ad blocking
which is radically different from current techniques.
Current ad blocking is based on the laborious process of
creating filter rules and is easily disrupted by obfuscation
implemented by publishers. In contrast we take a principled
approach to the problem and present solutions that
are easier to implement and harder to evade. Our work
refutes the belief that the battle between publishers and
users is leading to a permanent arms race between the
two parties, and presents a much more nuanced picture.
Ad blocking is an important area of study for the security
community. It combines old techniques from the domains
of malware and program analysis with some new
concepts such a mimicking human behavior. There is a
significant need for follow-on technical work into the expansion
of techniques that we have introduced as well as
a debate on the ethics of ad blocking.
The future of ad blocking
[Arvind Narayanan/Freedom to Tinker]
The Future of Ad Blocking:
An Analytical Framework and New Techniques [Grant Storey, Dillon Reisman, Jonathan Mayer and Arvind Narayanan/Randomwalker]o
Fingerprint locks are catastrophically awful, part LXVII: the software security on the crowdfunded Tapplock "is basically nonexistent" -- the lock broadcasts its own unlock code over Bluetooth, and if you send it back to the lock, it pops open.
A team of computer scientists, psychologists and neuroscientists used eye-tracking and fMRI to measure how users perceived security warnings, such as warnings about app permissions and browser warnings about insecure pages and plugin installations.
Konrad Rieck has data-mined the nine top security conferences, compiling a decade-by-decade list of the papers most often cited in the presentations delivered at these events: top of the pile is Random Oracles are Practical: A Paradigm for Designing Efficient Protocols (Sci-Hub mirror), from the 1993 ACM Conference on Computer and Communications Security. Rieck has […]
Spring came and went, but we’re not here to judge if you didn’t get around to cleaning up your living space. After all, taking the time to vacuum your floors can stretch out into a lengthy task when you’re constantly switching between power outlets and trying to jam your machine into those tight corners. With […]
Projects big and small always go smoother when the whole team is collaborating, but members tend to get lost once the conference call ends. Timelinr is a project management solution that helps keep your stakeholders, team, and clients in the loop with high-level project roadmaps and granular task boards. Subscriptions are available today for $49.99. […]
The Adobe Creative Cloud is home to a suite of editing tools today’s creatives count on to produce their content. Whether you’re an aspiring photographer, animator, or graphic designer, Adobe’s programs can help you in your creative pursuits, and with the Complete Adobe CC Training Bundle, you can come to grips with six of them for […]