Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Google Says Chrome Cookie Replacement Plan Making Progress

Google says it’s making progress on plans to revamp Chrome user tracking technology aimed at improving privacy even as it faces challenges from regulators and officials.

Google says it’s making progress on plans to revamp Chrome user tracking technology aimed at improving privacy even as it faces challenges from regulators and officials.

The company gave an update Monday on its work to remove from its Chrome browser so-called third-party cookies, which are used by a website’s advertisers or partners and can be used to track a user’s internet browsing habits.

Third-party cookies been a longtime source of privacy concerns and Google said a year ago that it would do away with them, in an announcement that shook up the online advertising industry.

The changes will affect Chrome, the world’s dominant web browser, as well as other browsers based on Google’s Chromium technology such as Microsoft’s Edge. Rival browsers Safari and Mozilla Firefox have already removed third-party cookies by default but Google is taking a more gradual approach.

In a blog post, Google’s group product manager for user trust and privacy, Chetna Bindra, sought to ease fears about the project, saying the proposals will “help publishers and advertisers succeed while also protecting people’s privacy as they move across the web.”

Google said it was releasing new data on one proposed technology, which does away with “individual identifiers” and instead groups users into large demographic flocks.

The technique hides individual users in the online crowd and keeps a person’s web history private on a device’s browser. Tests results showed it can be an effective replacement for third party cookies, and advertisers can expect to see “at least 95% of the conversions per dollar spent when compared to cookie-based advertising,” Bindra said.

Conversions are actions users take when they see an ad, such as clicking to make a purchase or watch a video. Advertisers will be able to test out the system for themselves in the coming months.

Advertisement. Scroll to continue reading.

Marketers for an Open Web, a U.K. industry lobbying group, said Google’s announcement did nothing to ease concerns voiced by the ad industry and regulators and questioned whether the company’s data showed what it claimed.

Google’s plan has drawn scrutiny from Britain’s competition watchdog, which this month opened an investigation into whether it could undermine online ad competition and entrench Google’s dominant position in the digital advertising industry.

U.S. officials are also challenging Google’s behavior. A group of states filed a lawsuit against the company last month accusing it of “anti-competitive conduct” in the online ad industry.

Related: Google Location-Tracking Tactics Troubled Its Own Engineers

Related: Austria Privacy NGO Takes on Apple Over ‘Tracking Code’

Related: Privacy Activists in EU File Complaints Over iPhone Tracking

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...