
ACK NO WL E DG E ME N TS
We thank our shepherd Ruben Cuevas and the anonymous
reviewers for their helpful feedback. The research leading
to these results has received funding from the EU’s H2020
Programme under grand agreements 830927 (project CON-
CORDIA) and 871370 (project PIMCITY). The paper reflects
only the authors’ views and the Commission is not responsible
fsor any use that may be made of the information it contains.
REF ERE NC E S
[1] F. Roesner, T. Kohno, and D. Wetherall, “Detecting and defending
against third-party tracking on the web,” in Proceedings of the 9th
USENIX Conference on Networked Systems Design and Implementation,
ser. NSDI’12. Berkeley, CA, USA: USENIX Association, 2012, pp.
12–12. [Online]. Available: http://dl.acm.org/citation.cfm?id=2228298.
2228315
[2] S. Englehardt and A. Narayanan, “Online tracking: A 1-million-site
measurement and analysis,” in Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security, ser. CCS ’16.
New York, NY, USA: ACM, 2016, pp. 1388–1401. [Online]. Available:
http://doi.acm.org/10.1145/2976749.2978313
[3] P. Eckersley, “How unique is your web browser?” in Proceedings of
the 10th International Conference on Privacy Enhancing Technologies,
ser. PETS’10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 1–18.
[Online]. Available: http://dl.acm.org/citation.cfm?id=1881151.1881152
[4] G. Acar, M. Juarez, N. Nikiforakis, C. Diaz, S. G¨urses, F. Piessens,
and B. Preneel, “Fpdetective: Dusting the web for fingerprinters,”
in Proceedings of the 2013 ACM SIGSAC Conference on Computer
& Communications Security, ser. CCS ’13. New York, NY,
USA: ACM, 2013, pp. 1129–1140. [Online]. Available: http:
//doi.acm.org/10.1145/2508859.2516674
[5] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens,
and G. Vigna, “Cookieless monster: Exploring the ecosystem of
web-based device fingerprinting,” in Proceedings of the 2013 IEEE
Symposium on Security and Privacy, ser. SP ’13. Washington, DC,
USA: IEEE Computer Society, 2013, pp. 541–555. [Online]. Available:
http://dx.doi.org/10.1109/SP.2013.43
[6] L. Olejnik, T. Minh-Dung, and C. Castelluccia, “Selling off privacy
at auction,” in Network and Distributed System Security Symposium
(NDSS), 2014.
[7] M. A. Bashir and C. Wilson, “Diffusion of user tracking data in
the online advertising ecosystem,” Proceedings on Privacy Enhancing
Technologies, vol. 2018, no. 4, pp. 85–103, 2018.
[8] G. Acar, C. Eubank, S. Englehardt, M. Juarez, A. Narayanan, and
C. Diaz, “The web never forgets: Persistent tracking mechanisms
in the wild,” in Proceedings of the 2014 ACM SIGSAC Conference
on Computer and Communications Security, ser. CCS ’14. New
York, NY, USA: ACM, 2014, pp. 674–689. [Online]. Available:
http://doi.acm.org/10.1145/2660267.2660347
[9] P. Papadopoulos, N. Kourtellis, and E. P. Markatos, “The cost of digital
advertisement: Comparing user and advertiser views,” in Proceedings of
the 2018 World Wide Web Conference, ser. WWW ’18. International
World Wide Web Conferences Steering Committee, 2018, p. 1479–1489.
[10] P. Papadopoulos, N. Kourtellis, and E. Markatos, “Cookie synchroniza-
tion: Everything you always wanted to know but were afraid to ask,” in
The World Wide Web Conference. ACM, 2019, pp. 1432–1442.
[11] Council of the European Union , European Parliament, “Directive
2002/58/ec of the european parliament and of the council of 12 july
2002 concerning the processing of personal data and the protection of
privacy in the electronic communications sector (directive on privacy
and electronic communications).”
[12] ——, “Regulation (eu) 2016/679 of the european parliament and of
the council of 27 april 2016 on the protection of natural persons with
regard to the processing of personal data and on the free movement
of such data, and repealing directive 95/46/ec (general data protection
regulation),” 2016.
[13] “California consumer privacy act of 2018 [1798.100 - 1798.199],” 2018.
[14] C. Iordanou, G. Smaragdakis, I. Poese, and N. Laoutaris, “Tracing
cross border web tracking,” in Proceedings of the Internet Measurement
Conference 2018. ACM, 2018, pp. 329–342.
[15] M. Degeling, C. Utz, C. Lentzsch, H. Hosseini, F. Schaub, and T. Holz,
“We value your privacy... now take some cookies: Measuring the gdpr’s
impact on web privacy,” arXiv preprint arXiv:1808.05096, 2018.
[16] A. Dabrowski, G. Merzdovnik, J. Ullrich, G. Sendera, and E. Weippl,
“Measuring cookies and web privacy in a post-gdpr world,” in In-
ternational Conference on Passive and Active Network Measurement.
Springer, 2019, pp. 258–270.
[17] J. Sørensen and S. Kosta, “Before and after gdpr: The changes in third
party presence at public and private european websites,” in WWW ’19
Companion Proceedings of the The Web Conference 2019. United
States: Association for Computing Machinery, 1 2019.
[18] C. Utz, M. Degeling, S. Fahl, F. Schaub, and T. Holz, “(un) informed
consent: Studying gdpr consent notices in the field,” in Proceedings of
the 2019 ACM SIGSAC Conference on Computer and Communications
Security, 2019, pp. 973–990.
[19] P. Agarwal, S. Joglekar, P. Papadopoulos, N. Sastry, and N. Kourtellis,
“Stop tracking me bro! differential tracking of user demographics on
hyper-partisan websites,” in Proceedings of The Web Conference 2020,
ser. WWW ’20, 2020, p. 1479–1490.
[20] S. Zimmeck, J. S. Li, H. Kim, S. M. Bellovin, and T. Jebara, “A privacy
analysis of cross-device tracking,” in 26th USENIX Security Symposium,
ser. USENIX Security 17. USENIX Association, 2017, pp. 1391–1408.
[21] J. Brookman, P. Rouge, A. Alva, and C. Yeung, “Cross-device track-
ing: Measurement and disclosures,” Proceedings on Privacy Enhancing
Technologies, 2017.
[22] K. Solomos, P. Ilia, S. Ioannidis, and N. Kourtellis, “Talos: An automated
framework for cross-device tracking detection,” in 22nd International
Symposium on Research in Attacks, Intrusions and Defenses (RAID
2019), 2019.
[23] J. R. Mayer and J. C. Mitchell, “Third-party web tracking: Policy
and technology,” in Proceedings of the 2012 IEEE Symposium
on Security and Privacy, ser. SP ’12. Washington, DC, USA:
IEEE Computer Society, 2012, pp. 413–427. [Online]. Available:
http://dx.doi.org/10.1109/SP.2012.47
[24] M. Falahrastegar, H. Haddadi, S. Uhlig, and R. Mortier, “Tracking
personal identifiers across the web,” in International Conference on
Passive and Active Network Measurement. Springer, 2016, pp. 30–
41.
[25] Z. Yu, S. Macbeth, K. Modi, and J. M. Pujol, “Tracking the
trackers,” in Proceedings of the 25th International Conference on
World Wide Web, ser. WWW ’16. Republic and Canton of
Geneva, Switzerland: International World Wide Web Conferences
Steering Committee, 2016, pp. 121–132. [Online]. Available: https:
//doi.org/10.1145/2872427.2883028
[26] N. Nikiforakis, W. Joosen, and B. Livshits, “Privaricator: Deceiving
fingerprinters with little white lies,” in Proceedings of the 24th
International Conference on World Wide Web, ser. WWW ’15.
Republic and Canton of Geneva, Switzerland: International World Wide
Web Conferences Steering Committee, 2015, pp. 820–830. [Online].
Available: https://doi.org/10.1145/2736277.2741090
[27] A. Panchenko, F. Lanze, J. Pennekamp, T. Engel, A. Zinnen, M. Henze,
and K. Wehrle, “Website fingerprinting at internet scale.” in NDSS, 2016.
[28] A. Lerner, A. K. Simpson, T. Kohno, and F. Roesner, “Internet
jones and the raiders of the lost trackers: An archaeological
study of web tracking from 1996 to 2016,” in 25th USENIX
Security Symposium (USENIX Security 16). Austin, TX: USENIX
Association, 2016. [Online]. Available: https://www.usenix.org/
conference/usenixsecurity16/technical-sessions/presentation/lerner
[29] V. Kalavri, J. Blackburn, M. Varvello, and K. Papagiannaki, “Like a
pack of wolves: Community structure of web trackers,” in International
Conference on Passive and Active Network Measurement. Springer,
2016, pp. 42–54.
[30] T. Urban, D. Tatang, M. Degeling, T. Holz, and N. Pohlmann, “The
unwanted sharing economy: An analysis of cookie syncing and user
transparency under gdpr,” arXiv preprint arXiv:1811.08660, 2018.
[31] I. Sanchez-Rola, M. Dell’Amico, P. Kotzias, D. Balzarotti, L. Bilge, P.-
A. Vervier, and I. Santos, “Can i opt out yet? gdpr and the global illusion
of cookie control,” in Proceedings of the 2019 ACM Asia Conference
on Computer and Communications Security, 2019, pp. 340–351.
[32] Alexa, “The top 500 sites on the web,” https://www.alexa.com/topsites/
category/Top/, 2018.
[33] Disconnect, “Disconnect lets you visualize and block the invisible
websites that track your browsing history,” https://disconnect.me/, 2018.