SecAppDev 2025 lecture details
Web Tracking Technologies
This talk will cover the privacy risks of web tracking technologies and how they are constantly evolving because of emerging privacy-preserving tools but also because of regulatory action and enforcement of privacy and data protection law.
Wednesday June 4th, 09:00 - 10:30
Room West Wing
Add to calendar (ICS) Add to Google calendarAbstract
Currently, users are confronted with all kinds of privacy-unfriendly solutions and manipulative designs when surfing the web. Third-party trackers keep coming up with alternative methods in order to circumvent existing tracker-blocking tools. Even when users are offered a choice, websites often don't respect it or include dark patterns to nudge users making less privacy-friendly choices than intended. In this talk, we will discuss the different web tracking technologies, their privacy risks and how users can protect themselves from them, as well as the best practices regarding consent.
Key takeaway
Emerging privacy-preserving tools can aid users in protecting their privacy on the web. However, a privacy by design mindset is the only way forward.
Content level
Introductory
Target audience
Anyone with an interest in web privacy and online tracking
Prerequisites
None

Related lectures
Threat Modeling for Intimate Partner Abuse
Introductory lecture by Eva Galperin in room Lemaire
Monday June 2nd, 09:15 - 10:30
Most developers don't think of protection against domestic abusers as part of a product's security and they should.
Key takeaway: The intimate partner abuse threat model is different other models in important and unexpected ways.
The Engineer’s Guide to Data Privacy
Deep-dive lecture by Vera Rimmer in room Lemaire
Wednesday June 4th, 14:00 - 15:30
In this session we will walk through the engineer’s toolbox for protecting different types of data against common privacy threats. The talk is informed by existing practical tools as well as by modern research on data privacy.
Key takeaway: Privacy is an engineering responsibility, not only a legal or design issue. Privacy-preserving techniques are accessible and implementable today.
COED Technologies: what they can and can't do
Introductory lecture by Cyprien de Saint Guilhem in room Lemaire
Tuesday June 3rd, 11:00 - 12:30
MPC, FHE and ZKP are complementary COED technologies that provide different flavours of confidentiality and verifiability within different trust settings and threat models. Often, neither one of them is a miracle solution alone.
Key takeaway: Preserving data confidentiality during computation is a real-world possibility given the right choice and combination of COED tools.