{"id":19012,"date":"2022-05-11T10:45:07","date_gmt":"2022-05-11T18:45:07","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/11\/news-12745\/"},"modified":"2022-05-11T10:45:07","modified_gmt":"2022-05-11T18:45:07","slug":"news-12745","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/11\/news-12745\/","title":{"rendered":"Thousands of Top Websites See What You Type\u2014Before You Hit Submit"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/627afe4d0973df5979fdbdf6\/master\/pass\/Websites-Can-See-What-You-Type-Security-GettyImages-1171308125.png\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 11 May 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">When you sign<\/span> up for a newsletter, make a hotel reservation, or check out online, you probably take for granted that if you mistype your email address three times or change your mind and X out of the page, it doesn&#x27;t matter. Nothing actually happens until you hit the Submit button, right? Well, maybe not. As with so many assumptions about the web, this isn&#x27;t always the case, according to <a data-offer-url=\"https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/&quot;}\" href=\"https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/\" rel=\"nofollow noopener\" target=\"_blank\">new research<\/a>: A surprising number of websites are collecting some or all of your data as you type it into a digital form.<\/p>\n<p class=\"paywall\">Researchers from KU Leuven, Radboud University, and University of Lausanne crawled and analyzed the top 100,000 websites, looking at scenarios in which a user is visiting a site while in the European Union and visiting a site from the United States. They found that 1,844 websites gathered an EU user&#x27;s email address without their consent, and a staggering 2,950 logged a US user&#x27;s email in some form. Many of the sites seemingly do not intend to conduct the data-logging but incorporate third-party marketing and analytics services that cause the behavior.<\/p>\n<p class=\"paywall\">After specifically crawling sites for password leaks in May 2021, the researchers also found 52 websites in which third parties, including the Russian tech giant Yandex, were incidentally collecting password data before submission. The group disclosed their findings to these sites, and all 52 instances have since been resolved.<\/p>\n<p class=\"paywall\">\u201cIf there\u2019s a Submit button on a form, the reasonable expectation is that it does something\u2014that it will submit your data when you click it,\u201d says G\u00fcne\u015f Acar, a professor and researcher in Radboud University&#x27;s digital security group and one of the leaders of the study. \u201cWe were super surprised by these results. We thought maybe we were going to find a few hundred websites where your email is collected before you submit, but this exceeded our expectations by far.\u201d<\/p>\n<p class=\"paywall\">The researchers, who will <a data-offer-url=\"https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/senol\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/senol&quot;}\" href=\"https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/senol\" rel=\"nofollow noopener\" target=\"_blank\">present<\/a> their findings at the Usenix security conference in August, \u00a0say they were inspired to investigate what they call \u201cleaky forms\u201d by media reports, <a data-offer-url=\"https:\/\/gizmodo.com\/before-you-hit-submit-this-company-has-already-logge-1795906081\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/gizmodo.com\/before-you-hit-submit-this-company-has-already-logge-1795906081&quot;}\" href=\"https:\/\/gizmodo.com\/before-you-hit-submit-this-company-has-already-logge-1795906081\" rel=\"nofollow noopener\" target=\"_blank\">particularly<\/a> from <a data-offer-url=\"https:\/\/gizmodo.com\/be-warned-customer-service-agents-can-see-what-youre-t-1830688119\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/gizmodo.com\/be-warned-customer-service-agents-can-see-what-youre-t-1830688119&quot;}\" href=\"https:\/\/gizmodo.com\/be-warned-customer-service-agents-can-see-what-youre-t-1830688119\" rel=\"nofollow noopener\" target=\"_blank\">Gizmodo<\/a><em>,<\/em> about third parties collecting form data regardless of submission status. They point out that, at its core, the behavior is similar to so-called key loggers, which are typically <a href=\"https:\/\/www.wired.com\/story\/ios-macos-hacks-hong-kong-watering-hole\/\">malicious programs<\/a> that log everything a target types. But on a mainstream top-1,000 site, users probably won&#x27;t expect to have their information keylogged. And in practice, the researchers saw a few variations of the behavior. Some sites logged data keystroke by keystroke, but many grabbed complete submissions from one field when users clicked to the next.<\/p>\n<p class=\"paywall\">\u201cIn some cases, when you click the next field, they collect the previous one, like you click the password field and they collect the email, or you just click anywhere and they collect all the information immediately,&quot; says Asuman Senol, a privacy and identity researcher at KU Leuven and one of the study coauthors. &quot;We didn\u2019t expect to find thousands of websites; and in the US, the numbers are really high, which is interesting,\u201d\u00a0<\/p>\n<p class=\"paywall\">The researchers say that the regional differences may be related to companies being more cautious about user tracking, and even potentially integrating with fewer third parties, because of the EU&#x27;s General Data Protection Regulation. But they emphasize that this is just one possibility, and the study didn&#x27;t examine explanations for the disparity.<\/p>\n<p class=\"paywall\">Through a substantial effort to notify websites and third parties collecting data in this way, the researchers found that one explanation for some of the unexpected data collection may have to do with the challenge of differentiating a \u201csubmit\u201d action from other user actions on certain web pages. But the researchers emphasize that from a privacy perspective, this is not an adequate justification.<\/p>\n<p class=\"paywall\">Since completing their <a data-offer-url=\"https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/leaky-forms-usenix-sec22.pdf\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/leaky-forms-usenix-sec22.pdf&quot;}\" href=\"https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/leaky-forms-usenix-sec22.pdf\" rel=\"nofollow noopener\" target=\"_blank\">paper<\/a>, the group also had a discovery about Meta Pixel and TikTok Pixel, invisible marketing trackers that services embed on their websites to track users across the web and show them ads. Both claimed in their documentation that a customers could turn on \u201cautomatic advanced matching,\u201d which would trigger data collection when a user submitted a form. In practice, though, the researchers found that these tracking pixels were grabbing hashed email addresses, an obscured version of email addresses used to identify web users across platforms, before submission. For US users, 8,438 sites may have been leaking data to Meta, Facebook\u2019s parent company, through pixels, and 7,379 sites may be impacted for EU users. For TikTok Pixel, the group found 154 sites for US users and 147 for EU users.<\/p>\n<p class=\"paywall\">The researchers filed a bug report with Meta on March 25, and the company quickly assigned an engineer to the case, but the group has not heard an update since. The researchers notified TikTok on April 21\u2014they discovered the TikTok behavior more recently\u2014and have not heard back. Meta and TikTok did not immediately return WIRED&#x27;s request for comment about the findings.<\/p>\n<p class=\"paywall\">\u201cThe privacy risks for users are that they will be tracked even more efficiently; they can be tracked across different websites, across different sessions, across mobile and desktop,\u201d Acar says. \u201cAn email address is such a useful identifier for tracking, because it\u2019s global, it\u2019s unique, it\u2019s constant. You can\u2019t clear it like you clear your cookies. It&#x27;s a very powerful identifier.\u201d<\/p>\n<p class=\"paywall\">Acar also points out that, as tech companies look to phase out cookie-based tracking in a nod to privacy concerns, marketers and other analysts will rely more and more heavily on static IDs like phone numbers and email addresses.<\/p>\n<p class=\"paywall\">Since the findings indicate that deleting data in a form before submitting it may not be enough to protect yourself from all collection, the researchers created a <a data-offer-url=\"https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/#leak-inspector\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/#leak-inspector&quot;}\" href=\"https:\/\/homes.esat.kuleuven.be\/~asenol\/leaky-forms\/#leak-inspector\" rel=\"nofollow noopener\" target=\"_blank\">Firefox extension<\/a> called LeakInspector to detect rogue form collection. And they say they hope their findings will raise awareness about the issue, not only for regular web users but for website developers and administrators who can proactively check whether their own systems or any of the third parties they&#x27;re using are collecting data from forms without consent.\u00a0<\/p>\n<p class=\"paywall\">Leaky forms are just one more type of data collection to be wary of in an already extremely crowded online field.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/leaky-forms-keyloggers-meta-tiktok-pixel-study\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/627afe4d0973df5979fdbdf6\/master\/pass\/Websites-Can-See-What-You-Type-Security-GettyImages-1171308125.png\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Wed, 11 May 2022 11:00:00 +0000<\/strong><\/p>\n<p>A surprising number of the top 100,000 websites effectively include keyloggers that covertly snag everything you type into a form.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21382],"class_list":["post-19012","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-privacy"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19012","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19012"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19012\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19012"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19012"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19012"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}