Phorming

17
Phorming (….and privacy issues) Sandeep Sreenivasan Techie

description

Phorming - The legal and the technical aspects of Phorming. IS phorming a serious threat or a boon?

Transcript of Phorming

Page 1: Phorming

Phorming (….and privacy issues)

Sandeep Sreenivasan

Techie

Page 2: Phorming

Outline

• What is phorming?• How phorming works?

» Technical aspects» Legal Aspects

• Pros of phorming• Cons of phorming• Conclusion

Page 3: Phorming

What is Phorming?

• “A parasitic marketing technique, which involves intercepting website traffic to profile ISP user’s interests and affiliations (without explicit consent from either the website or their users)” [1]

• Phorm – 121 Media

Page 4: Phorming

How phorming works?

• Technical Aspects:- Assignment of 24 digit random number (Phom UID)- User searches for query- Search Query and UID sniffed by Phorm server- Retrieval of user search query from web- Compare web information with relevant channels- Sending search response and targeted Ads

Page 5: Phorming

ISP Server

Client Machine

Web Server

Phorm Server

Page 6: Phorming

ISP Server

Web Server

Phorm Server

Page 7: Phorming
Page 8: Phorming
Page 9: Phorming
Page 10: Phorming

ISP Server Phorm Server

Client machine

Page 11: Phorming

How phorming works?

• Legal Aspects:

- Interception of communication: An offence contrary to Section 1 of RIPA 2000

- Fraud: An offence contrary to Section 1 of Fraud Act 2006

- Unlawful processing of sensitive personal data: Contrary to DPA 1998

Page 12: Phorming

Pros of phorming

• Receive targeted Ads instead of random ones• Expertise and time required for searching

information is reduced• Browser independent• Minimal bandwidth usage• Add on facilities

» Monitoring surfing habits and suggest related web pages» Protection against phishing

Page 13: Phorming

Cons of phorming• Third party private company( No contractual arrangement with)

gets to see all your HTTP traffic

• If you opt out, third party can still see your traffic

• If you opt out, but clear you cookies you are back into the system

• Anti phishing services are already standard with most modern web browsers

• Phorm under previous incarnation produced spyware

Page 14: Phorming

Conclusion

• Key benefits: ISP and phorming company

• Vicious circle for the user

Page 15: Phorming

Questions??

Page 16: Phorming

References[1] The urban dictionary – http://www.urbandictionary.com/define.php?term=phorming

[2] Phorm: http://www.phorm.com/faq.html

[3] Phorm “Webwise” system – Richard Clayton, May 2008, www.cl.cam.ac.uk/~rnc1/080518-phorm.pdf

[4] Wikipedia: www.wikipedia.com

[5] Images courtesy: www.images.google.com

Page 17: Phorming