Europan Data Protection Board (2023). 2022 Coordinated
Enforcement Action - use of cloud-based services by
the public sector . https://edpb.europa.eu/system/files/
2023-01/edpb 20230118 cef cloud-basedservices
publicsector en.pdf.
Franke, U. (2012). Optimal IT service availability: Shorter
outages, or fewer? IEEE Transactions on Network
and Service Management, 9(1):22–33.
Information Commissioner’s Office (2019). Update
report into adtech and real time bidding. https://
ico.org.uk/media/about-the-ico/documents/2615156/
adtech-real-time-bidding-report-201906.pdf.
Je
ˇ
r
´
abek, K. and Pol
ˇ
c
´
ak, L. (2023). Network error logging:
HTTP archive analysis. Preprint at https://arxiv.org/
abs/2305.01249.
Kline, J., Barford, P., Cahn, A., and Sommers, J. (2017). On
the structure and characteristics of user agent string. In
Proceedings of the 2017 Internet Measurement Con-
ference, page 184–190, New York, NY, USA. Associ-
ation for Computing Machinery.
Krishnamurthy, B. and Wills, C. (2011). Privacy leakage vs.
protection measures: the growing disconnect. In Pro-
ceedings of the Web 2.0 Security and Privacy Work-
shop.
Li, X., Wu, C., Ji, S., Gu, Q., and Beyah, R. (2018). HSTS
measurement and an enhanced stripping attack against
HTTPS. In Security and Privacy in Communication
Networks, pages 489–509, Cham. Springer Interna-
tional Publishing.
Mayer, J. R. and Mitchell, J. C. (2012). Third-party web
tracking: Policy and technology. In 2012 IEEE Sym-
posium on Security and Privacy, pages 413–427.
Michael Schwarz, M. L. and Gruss, D. (2018). Javascript
zero: Real javascript and zero side-channel attacks. In
Network and Distributed Systems Security Symposium
2018.
Pol
ˇ
c
´
ak, L., Salo
ˇ
n, M., Maone, G., Hranick
´
y, R., and McMa-
hon, M. (2023). JShelter: Give me my browser back.
In Proceedings of the 20th International Conference
on Security and Cryptography. SciTePress - Science
and Technology Publications.
Raman, R. S., Evdokimov, L., Wurstrow, E., Halderman,
J. A., and Ensafi, R. (2020). Investigating large scale
https interception in Kazakhstan. In Proceedings of
the ACM Internet Measurement Conference, IMC ’20,
pages 125–132, New York, NY, USA. Association for
Computing Machinery.
Stricot-Tarboton, S., Chaisiri, S., and Ko, R. K. (2016).
Taxonomy of man-in-the-middle attacks on HTTPS.
In 2016 IEEE Trustcom/BigDataSE/ISPA, pages 527–
534.
Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., and
Cranor, L. F. (2009). Crying wolf: An empirical
study of SSL warning effectiveness. In Proceedings of
the 18th Conference on USENIX Security Symposium,
SSYM’09, pages 399–416. USENIX Association.
The European Parliament and The Council of the European
Union (2002). Directive 2002/58/EC. Directive on pri-
vacy and electronic communications. Official Journal
L 201.
The European Parliament and The Council of the European
Union (2009). Directive 2009/136/EC. Official Jour-
nal L 337.
The European Parliament and The Council of the European
Union (2016). Regulation 2016/679/EU. General Data
Protection Regulation (GDPR). Official Journal of the
European Union L 119, 4.5.2016.
The Office for Personal Data Protection (2021). State-
ment on the reservation system for covid-19 vacci-
nation. https://www.uoou.cz/en/vismo/dokumenty2.
asp?id org=200156&id=2011.
Trevisan, M., Travers, S., Bassi, E., and Mellia, M. (2019).
4 years of EU cookie law: Results and lessons
learned. Proceedings on Privacy Enhancing Tech-
nologies, 2019:126–145.
van Hoboken, J. and Zuiderveen Borgesius, F. (2015).
Scoping electronic communication privacy rules:
Data, services and values. Journal of Intellec-
tual Property, Information Technology and Electronic
Commerce Law, 6(3):198–210.
W3C (2021). Network error logging. The World Wide
Web Consortium (W3C) internal document, https://
w3c.github.io/network-error-logging/, Editor’s Draft
of 30th July 2021.
W3C (2022a). Push API. The World Wide Web Con-
sortium (W3C), Web Applications Working Group,
https://www.w3.org/TR/push-api/, Working Draft of
30 June 2022.
W3C (2022b). Service workers nightly. The World Wide
Web Consortium (W3C), Service Workers Working
Group, https://w3c.github.io/ServiceWorker/, Editor’s
Draft of 28 November 2022.
WP29 (2012). Opinion 04/2012 on Cookie Consent
Exemption. Article 29 Data Protection Working
Party, WP 194, https://ec.europa.eu/justice/article-29/
documentation/opinion-recommendation/files/2012/
wp194 en.pdf.
Yen, T.-F., Xie, Y., Yu, F., Yu, R. P., and Abadi, M. (2012).
Host fingerprinting and tracking on the web: Privacy
and security implications. In Network and Distributed
System Security (NDSS) Symposium.
ˇ
Spa
ˇ
cek, S., La
ˇ
stovi
ˇ
cka, M., Hor
´
ak, M., and Plesn
´
ık, T.
(2019). Current issues of malicious domains blocking.
In 2019 IFIP/IEEE Symposium on Integrated Network
and Service Management (IM), pages 551–556.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
690