Google Chrome Privacy “Fenced Frame” Restricts User Tracking

Share post:

In order to prevent user tracking, browser developers are restricting third-party cookies. In light of this, advertising companies, the primary beneficiaries of third-party cookies, have proposed different programming APIs that advertisers can use for interest-based advertising.

These new interest-based advertising technologies include Google’s FLoC, Microsoft’s PARAKEET, and Facebook’s Conversion Lift. After the removal of third-party cookies, these technologies are expected to be unable to track users by linking data between iframe and its embedder.

To prevent the technologies from tracking users, Google will add a new form of embedded iframe, called a “fenced frame.” The “Fenced Frame” isolates the embedded content and also ensures that the technologies cannot view the user data of the embedding page. Simply put, the “Fenced Frame” feature ensures that two pages do not share user data, thereby preventing user tracking or other privacy threats.

For more information, read the original story in Bleeping Computer

SUBSCRIBE NOW

Related articles

Cyber Security Today, May 8, 2024 – The alleged LockBit ransomware leader is identified, and the gang makes false claims of new victims

The alleged LockBit ransomware leader is identified, and the gang makes false claims of new victims. Welcome to Cyber...

Microsoft Ties Executive Pay to Security Performance to Boost Cybersecurity Focus

Microsoft is reported to be tying executive compensation to its security performance, signalling a serious commitment to addressing...

Cyber Security Today, May 6, 2024 – Ransomware gang claims responsibility for attacking Italian healthcare service, Russian gang blamed for attacks in Europe, and...

Ransomware gang claims responsibility for attacking Italian healthcare service, Russian gang blamed for attacks in Europe, and more. Welcome...

Microsoft reveals critical security flaw affecting Android apps

Microsoft has identified a serious vulnerability in Android apps that could allow malicious software to hijack legitimate apps...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways