Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Your graphics card could be used to track you across the web regardless of cookie consent
PC Gamer ^ | 31 January 2022 | Jacob Ridley

Posted on 01/31/2022 11:33:39 AM PST by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-31 next last

1 posted on 01/31/2022 11:33:39 AM PST by ShadowAce
[ Post Reply | Private Reply | View Replies]

To: rdb3; JosephW; martin_fierro; Still Thinking; zeugma; Vinnie; ironman; Egon; raybbr; AFreeBird; ...

2 posted on 01/31/2022 11:33:50 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Sounds like nonsense to me.


3 posted on 01/31/2022 11:37:08 AM PST by AppyPappy (Biden told Al Roker "America is back". Unfortunately, he meant back to the 1970's)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy
It's basically a bug in the WebGL specification that can allow trackers to track you.

I'm hoping they'll actually fix it.

4 posted on 01/31/2022 11:45:21 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 3 | View Replies]

To: ShadowAce

Can’t they just use the MAC id? Anyone who is really concerned can monkey with the settings a touch regularly (resolution, color depth, gaming fps, dedicated memory). One easy way to deal with both is to create a VM and work from the VM.


5 posted on 01/31/2022 12:08:24 PM PST by Dr. Sivana ( “to defend themselves, they are using the same weapons with which they were struck.”Pope St. Pius X)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Doesn’t each processor chip (the CPU hardware) have a unique serial number. Couldn’t that be embedded in various outgoing messages?

I’d say don’t use a computer or phone if you are really concerned about being snooped on. Maybe not mail either. Try to communicate with a wink of the eye.


6 posted on 01/31/2022 12:15:06 PM PST by cymbeline
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dr. Sivana

“One easy way to deal with both is to create a VM and work from the VM.”

VMs are the way to go. On my next computer I want to go with Qubes OS.


7 posted on 01/31/2022 12:22:02 PM PST by beef (Let’s go Baizuo!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: ShadowAce

and , I don’t care


8 posted on 01/31/2022 12:34:05 PM PST by butlerweave
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce
Could not the serial number of any device in the computer do, including the motherboard?

9 posted on 01/31/2022 12:35:09 PM PST by BitWielder1 (I'd rather have Unequal Wealth than Equal Poverty.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Tracking my PC won’t do much good. It just sits in my home office, day after day. I don’t even carry my cell phone “religiously”...just when I think I might actually need it.


10 posted on 01/31/2022 12:42:24 PM PST by Wonder Warthog (Not Responding to Seagull Snark)
[ Post Reply | Private Reply | To 1 | View Replies]

To: cymbeline
Access to the CPUID in an Intel CPU is selectable from the BIOS. It can be shut off. Another source of keys that are not as easily protected is the TPM module. It is epoxy potted and soldered to the motherboard. The keys inside are employed to encrypt the attached hard disk so that relocating the disk to a different box yields an unreadable drive without the TPM keys.

MAC ids on network and motherboard interfaces are often in EEPROM and capable of override for spoofing purposes. Some vendors use a MAC ID as a license key. That was viable when the manufacturer generated an immutable key for the network interface. That's not the case anymore.

Finding ways to track your activity will be a perpetual cloak and dagger effort. New ones will crop up soon after you've nailed the ones you discovered.

11 posted on 01/31/2022 12:49:37 PM PST by Myrddin
[ Post Reply | Private Reply | To 6 | View Replies]

To: Wonder Warthog

Same with my PC, sits at home and I don’t even own a cell phone.


12 posted on 01/31/2022 2:17:11 PM PST by oldasrocks
[ Post Reply | Private Reply | To 10 | View Replies]

To: Myrddin

“Finding ways to track your activity will be a perpetual cloak and dagger effort.”

I think you’re correct. You know more about what’s going on inside those boxes than I do.

My company’s IT department is all the time fiddling with security software and training.


13 posted on 01/31/2022 2:30:52 PM PST by cymbeline
[ Post Reply | Private Reply | To 11 | View Replies]

To: ShadowAce

Begs the question of which GPU’s are compromised and how far back. I ask this as I have access to many older GPU’S as well as older rigs starting with the XT.


14 posted on 01/31/2022 2:49:34 PM PST by LastDayz (A blunt and brazen Texan. I will not be assimilated.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

and if you use a VPN?


15 posted on 01/31/2022 3:59:15 PM PST by FLT-bird
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dr. Sivana

MAC IDs can be spoofed.


16 posted on 01/31/2022 4:47:33 PM PST by Bikkuri (I am proud to be a PureBlood.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Bikkuri
MAC IDs can be spoofed.

They can be, but that is beyond what most people do with their computers.
17 posted on 01/31/2022 4:54:36 PM PST by Dr. Sivana ( “to defend themselves, they are using the same weapons with which they were struck.”Pope St. Pius X)
[ Post Reply | Private Reply | To 16 | View Replies]

To: ShadowAce

Privacy & Internet Security are a myth in the 21st Century.


18 posted on 01/31/2022 4:57:59 PM PST by Pol-92064
[ Post Reply | Private Reply | To 1 | View Replies]

To: AppyPappy

No, it does makes sense: your GPU can run custom code - just like the bitcoin miners use. The timing for different sections can be measured down to the microsecond. If there are consistent timing differences for different sections in the GPU, it’s like a fingerprint.

And if that wasn’t enough, combine that with your CPU+GPU model information, your amount of installed RAM, any peripherals, language, general location and anything else that the browser will provide, it is probably enough to uniquely identify your computer amongst millions.


19 posted on 01/31/2022 7:54:59 PM PST by mbj
[ Post Reply | Private Reply | To 3 | View Replies]

To: LastDayz

The fact that you are using such an old GPU will stick out like a sore thumb: your computer will be unlike almost anything else out there. It would be like painting your car psychedelic purple and pink: when they see that, it will uniquely identify YOU. (No one else has a rig like it.)

It’s not a security compromise, it’s a technique to uniquely identify your computer from millions of others on the Internet.


20 posted on 01/31/2022 7:58:06 PM PST by mbj
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-31 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson