This document discusses phorming, which is a marketing technique used by some internet service providers to intercept and analyze users' web traffic in order to display targeted ads. It works by assigning each user a random ID number and tracking their search queries and web browsing activity. While this allows for more personalized ads, it also raises major privacy and legal issues by collecting and sharing users' personal web data without their explicit consent. The document outlines the technical process of phorming, debates its pros and cons, and concludes that the main benefits go to the ISP and phorming company, rather than the individual users.
1 of 17
Download to read offline
More Related Content
Phorming
1. Phorming
The mother of all privacy issues
Techies
Darshan Karia
Sandeep Sreenivasan
2. Outline
What is phorming?
How phorming works?
損 Techie aspects
損 Legal Aspects
Pros of phorming
Cons of phorming
Conclusion
3. What is Phorming?
A parasitic marketing
technique, which involves
intercepting website traffic to
profile ISP users interests and
affiliations (without explicit
consent from either the website
or their users) [1]
Phorm 121 Media
4. How phorming works?
Techie Aspects:
- Assignment of 24 digit random number (Phom UID)
- User searches for query
- Search Query and UID sniffed by Phorm server
- Retrieval of user search query from web
- Compare web information with relevant channels
- Sending search response and targeted Ads
11. How phorming works?
Legal Aspects:
- Interception of communication: An offence
contrary to Section 1 of RIPA 2000
- Fraud: An offence contrary to Section 1 of
Fraud Act 2006
- Unlawful processing of sensitive personal
data: Contrary to DPA 1998
- Risk of committing civil wrongs: actionable
at the suit of website owners
12. Pros of phorming
Receive targeted Ads instead of random ones
Expertise and time required for searching
information is reduced
Browser independent
Minimal bandwidth usage
Add on facilities
損 Monitoring surfing habits and suggest related web pages
損 Protection against phishing
13. Cons of phorming
Third party private company( No contractual arrangement with)
gets to see all your HTTP traffic
If you opt out third party can still see your traffic
If you opt out, but clear you cookies you are back into the system
Anti phishing services are already standard with most modern web
browsers
Phorm under previous incarnation produced spyware