Skip to content

englehardt/verizon-uidh

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Description

A check for cookie respawning using Verizon's UIDH. Included in the repo is the code required to both run crawls and analyze the resulting databases. You can also find download links below for the databases I collected.

For my thoughts on the header, read my Freedom to Tinker post.

Scripts

  • OpenWPM-0.2.1/ - modified OpenWPM v0.2.1
  • list_domains.py - lists the domains where turn.com's respawned IDs are found
  • respawning.py - checks for cookies that may be respawned from the XUID header

The included OpenWPM code is largely similar to the public repository. I've simply added line 72 to automation/Proxy/MITMProxy.py, which inserts the UIDH header into all traffic. You can limit it to HTTP traffic by checking the http type of msg.request first.

Data

I ran a few crawls in parallel on EC2 on two different days. I used three different machines, but was sure to clear state between each crawl. You can find the data here.The name of the sqlite database indicates the configuration of the machine.

  • 'u': UIDH string (string 1 or string 2)
  • 'd': day the crawl took place on (day 1 or day 2)
  • 'm': the machine the crawl was run on (machine 1, 2, or 3).

About

Some simple scripts from my investigation of Verizon's UIDH

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published