, Tor Browser -Tor Project Official website, 2019.

, AmIUnique: Platform to collect browser fingerprints

. Adblock, , 2018.

M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi, Geo-indistinguishability: Differential Privacy for Location-based Systems, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS '13), pp.901-914, 2013.

D. J. Mika-d-ayenson, A. Wambach, N. Soltani, C. J. Good, and . Hoofnagle, Flash cookies and privacy II: Now with HTML5 and ETag respawning, Available at SSRN, p.1898390, 2011.

, Help your ads find the people who will love your business, 2019.

Y. Montjoye, A. César, M. Hidalgo, V. D. Verleysen, and . Blondel, Unique in the crowd: The privacy bounds of human mobility, Scientific reports, vol.3, p.1376, 2013.

A. Edelstein, Protections Against Fingerprinting and Cryptocurrency Mining Available in Firefox Nightly and Beta, 2019.

S. Englehardt and A. Narayanan, Online tracking: A 1-million-site measurement and analysis, Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, pp.1388-1401, 2016.

S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman, J. Mayer et al., Cookies that give you away: The surveillance implications of web tracking, Proceedings of the 24th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, pp.289-299, 2015.

, Electronic Frontier Foundation, 2018.

, Cliqz International GmbH, 2018.

E. Gmbh, Adblock Plus, 2018.

R. Hill, uBlock Origin -An efficient blocker for Chromium and Firefox. Fast and lean, 2018.

U. Iqbal, P. Snyder, S. Zhu, B. Livshits, Z. Qian et al., ADGRAPH: A Graph-Based Approach to Ad and Tracker Blocking, IEEE Security and Privacy, 2020.

P. Laperdrix, W. Rudametkin, and B. Baudry, Beauty and the beast: Diverting modern web browsers to build unique browser fingerprints, 2016 IEEE Symposium on Security and Privacy (SP), pp.878-894, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01285470

T. Libert, Exposing the Invisible Web: An Analysis of Third-Party HTTP Requests on 1 Million Websites, International Journal of Communication, vol.9, p.0, 2015.

I. Livadariu, K. Benson, A. Elmokashfi, A. Dhamdhere, and A. Dainotti, Inferring carrier-grade NAT deployment in the wild, IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp.2249-2257, 2018.

G. Maier, A. Feldmann, V. Paxson, and M. Allman, On dominant characteristics of residential broadband internet traffic, Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement, pp.90-102, 2009.

R. Jonathan, J. Mayer, and . Mitchell, Third-party web tracking: Policy and technology, 2012 IEEE symposium on security and privacy, pp.413-427, 2012.

X. Mi, Y. Liu, X. Feng, X. Liao, B. Liu et al., Resident Evil: Understanding residential ip proxy as a dark service, Resident Evil: Understanding Residential IP Proxy as a Dark Service, p.0, 2019.

, Free VPN | Browser with built-in VPN | Download | Opera, 2019.

A. Ramakrishna-padmanabhan, E. Dhamdhere, . Aben, C. Kc, and N. Spring, Reasons Dynamic Addresses Change, Proceedings of the, 2016.

, Internet Measurement Conference (IMC '16), pp.183-198

J. Schuh, Building a more private web, 2019.

A. Vastel, P. Laperdrix, W. Rudametkin, and R. Rouvoy, FP-STALKER: Tracking Browser Fingerprint Evolutions, IEEE S&P 2018-39th IEEE Symposium on Security and Privacy, pp.1-14, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01652021

J. Wilander, Intelligent Tracking Prevention | WebKit, 2017.

P. Winter, R. Köwer, M. Mulazzani, M. Huber, S. Schrittwieser et al., Spoiled onions: Exposing malicious Tor exit relays, International Symposium on Privacy Enhancing Technologies Symposium, pp.304-331, 2014.

Y. Xie, F. Yu, K. Achan, and E. Gillum, Moises Goldszmidt, and Ted Wobber, In ACM SIGCOMM Computer Communication Review, vol.37, pp.301-312, 2007.

Y. Ting-fang-yen, F. Xie, R. P. Yu, M. Yu, and . Abadi, Host Fingerprinting and Tracking on the Web: Privacy and Security Implications, 2012.

, In NDSS, vol.62, p.66

S. Zimmeck, S. Jie, H. Li, . Kim, M. Steven et al., A privacy analysis of cross-device tracking, 26th USENIX Security Symposium (USENIX Security 17, pp.1391-1408, 2017.