Confirmed users
77
edits
Canuckistani (talk | contribs) |
|||
| Line 50: | Line 50: | ||
== Market Insights from the Market Strategy Team == | == Market Insights from the Market Strategy Team == | ||
=== Desktop/Platform === | |||
* Support for Windows XP ended with roughly 27% of Windows users still using it [http://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10&qpcustomd=0], around 76% of IT Pros supporting it, [http://itreports.spiceworks.com/reports/spiceworks_voice_of_it_windows-xp-end-life-2013.pdf] 95% of ATMs still using it pending hardware upgrades. [http://www.theverge.com/2014/1/20/5326772/windows-xp-powers-95-percent-of-atms-worldwide] With no further updates to Internet Explorer on Windows XP and support for Chrome on Windows XP ending April 2015, [http://chrome.blogspot.co.uk/2013/10/extending-chrome-support-for-xp-users.html], the preferred secure browser for systems running Windows XP is an evolving space. | |||
* As Google Chrome adds support for new capabilities such as ephemeral mode [https://support.google.com/chrome/a/answer/3538894] and password manager updates [http://googlechromereleases.blogspot.com.au/2014/04/stable-channel-update.html], the Chromium framework is utilized as a platform for building browsers [http://lifehacker.com/four-alternative-useful-browsers-based-off-of-google-c-1558525397] which in some cases cut down features to improve privacy and speed. [http://www.srware.net/en/software_srware_iron_chrome_vs_iron.php] | |||
* A research report titled "Cookies that give you away" [http://randomwalker.info/publications/cookie-surveillance.pdf] illustrates how an eavesdropper can use multiple third-party cookies to link about 50% of a user’s history to the same pseudonymous ID even with just 25% of the current density of trackers on the web and then link to a real-life ID exposed on the Web. In the absence of third-party tracking cookies, the attacker's ability would be severely circumscribed by changes in the user's IP address. Methods of tracking users that block third-party cookies include HTTP redirect, [http://www.elie.net/blog/security/tracking-users-that-block-cookies-with-a-http-redirect] persistent and unblockable cookies, [http://www.nikcub.com/posts/persistant-and-unblockable-cookies-using-http-headers] and history extraction,[http://lcamtuf.coredump.cx/cachetime/firefox.html] which are not impossible to execute, but add more complexity. | |||
== Marketing, Press & Public Reaction == | == Marketing, Press & Public Reaction == | ||