{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:53:19Z","timestamp":1763740399124,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":130,"publisher":"ACM","funder":[{"name":"National Science Foundation","award":["2027208 and 2402963"],"award-info":[{"award-number":["2027208 and 2402963"]}]},{"name":"Ford Foundation Postdoctoral Fellowship","award":[""],"award-info":[{"award-number":[""]}]},{"name":"Northeastern Future Faculty Fellowship","award":[""],"award-info":[{"award-number":[""]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"DOI":"10.1145\/3730567.3764427","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:22:38Z","timestamp":1763738558000},"page":"692-708","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Where in the World Are My Trackers? Mapping Web Tracking Flow Across Diverse Geographic Regions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4579-3262","authenticated-orcid":false,"given":"Sachin Kumar","family":"Singh","sequence":"first","affiliation":[{"name":"University of Utah, Salt Lake City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6904-5192","authenticated-orcid":false,"given":"Robert","family":"Ricci","sequence":"additional","affiliation":[{"name":"University of Utah, Salt Lake City, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4462-4520","authenticated-orcid":false,"given":"Alexander","family":"Gamero-Garrido","sequence":"additional","affiliation":[{"name":"University of California, Davis, Davis, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ipwhois.io: IP Geolocation API Fast response and accurate data. https:\/\/ipwhois.io. Accessed 2025-09-21."},{"key":"e_1_3_2_1_2_1","volume-title":"Web measurement toolkit. https:\/\/github.com\/such-in\/gamma","author":"Gamma","year":"2025","unstructured":"Gamma: Web measurement toolkit. https:\/\/github.com\/such-in\/gamma, 2025. Accessed 2025-09-30."},{"key":"e_1_3_2_1_3_1","first-page":"387","volume-title":"2020 USENIX Annual Technical Conference (USENIX ATC 20)","author":"Din Zainul Abi","year":"2020","unstructured":"Zainul Abi Din, Panagiotis Tigas, Samuel T King, and Benjamin Livshits. Percival : Making in-browser perceptual ad blocking practical with deep learning. In 2020 USENIX Annual Technical Conference (USENIX ATC 20), pages 387-400, 2020."},{"key":"e_1_3_2_1_4_1","unstructured":"ahrefs. Top websites. https:\/\/ahrefs.com\/top. Accessed 2024-04-04."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355588"},{"key":"e_1_3_2_1_6_1","unstructured":"ANPDP. National authority for the protection of personal data. https:\/\/www.joradp.dz\/FTP\/JO-FRANCAIS\/2018\/F2018034.pdf. Accessed 2024-05-05."},{"key":"e_1_3_2_1_7_1","unstructured":"Uyen P. Le Anupam Chander. Data nationalism. https:\/\/scholarlycommons.law.emory.edu\/elj\/vol64\/iss3\/2\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423626"},{"key":"e_1_3_2_1_9_1","unstructured":"Argentina.gob.ar. Personal data protection. https:\/\/www.argentina.gob.ar\/aaip\/datospersonales. Accessed 2024-05-05."},{"key":"e_1_3_2_1_10_1","unstructured":"AWS. Amazon cloudfront key features. https:\/\/aws.amazon.com\/cloudfront\/features\/?p=ugi&l=emea&whats-new-cloudfront. Accessed 2024-05-05."},{"key":"e_1_3_2_1_11_1","unstructured":"AWS. What is a cdn (content delivery network)? https:\/\/aws.amazon.com\/what-is\/cdn\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278573"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3136067"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1561\/1800000029"},{"key":"e_1_3_2_1_15_1","unstructured":"Bright Data. Bright data: Limitless web data infrastructure for AI & BI. https:\/\/brightdata.com. Accessed 2025-05-10."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560574"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068846"},{"key":"e_1_3_2_1_18_1","unstructured":"CAIDA. Archipelago (ark): Caida's active measurement infrastructure serving the network research. https:\/\/www.caida.org\/projects\/ark\/locations\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_19_1","unstructured":"CAIDA. Mapping autonomous systems to organizations. https:\/\/www.caida.org\/archive\/as2org\/. Accessed 2024-05-05."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845104"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2909691"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108555"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0012"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00007"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000959"},{"key":"e_1_3_2_1_26_1","unstructured":"Cloudflare. What is a content delivery network (cdn)? | how do cdns work? https:\/\/www.cloudflare.com\/learning\/cdn\/what-is-a-cdn\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_27_1","unstructured":"Cloudwards. Netflix vpn not working? https:\/\/www.cloudwards.net\/how-to-beat-the-netflix-vpn-ban\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_28_1","unstructured":"Clydeco. Jordan issues first personal data protection law. https:\/\/www.clydeco.com\/en\/insights\/2023\/10\/jordan-issues-first-personal-data-protection-law. Accessed 2024-04-04."},{"key":"e_1_3_2_1_29_1","unstructured":"CNET. Geo-blocking explained: What to know and how you can get around it. https:\/\/www.cnet.com\/tech\/services-and-softwar\/what-is-geo-blocking-and-how-you-can-get-around-it\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_30_1","unstructured":"Comparitech. Where are vpns legal and where are they banned? https:\/\/www.comparitech.com\/vpn\/where-are-vpns-legal-banned\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW55150.2022.00024"},{"key":"e_1_3_2_1_32_1","unstructured":"cyberhost. 10 countries where vpns are illegal. find out who banned vpns and why. https:\/\/www.cyberghostvpn.com\/en_US\/privacyhub\/countries-banning-vpn\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_33_1","first-page":"2189","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Dambra Savino","year":"2022","unstructured":"Savino Dambra, Iskander Sanchez-Rola, Leyla Bilge, and Davide Balzarotti. When sally met trackers: Web tracking from the users' perspective. In 31st USENIX Security Symposium (USENIX Security 22), pages 2189-2206, 2022."},{"key":"e_1_3_2_1_34_1","unstructured":"Datacenters.com. Countries with data centers. https:\/\/www.datacenters.com\/locations\/countries. Accessed 2024-05-05."},{"key":"e_1_3_2_1_35_1","volume-title":"Jordan: An overview of the data protection law for","year":"2023","unstructured":"Dataguidance. Jordan: An overview of the data protection law for 2023. https:\/\/www.dataguidance.com\/opinion\/jordan-overview-data-protection-law-2023. Accessed 2024-04-04."},{"key":"e_1_3_2_1_36_1","unstructured":"Dataguidance. Malaysia - data protection overview. https:\/\/www.dataguidance.com\/notes\/malaysia-data-protection-overview. Accessed 2024-04-04."},{"key":"e_1_3_2_1_37_1","unstructured":"DB-IP. The db-ip database. https:\/\/db-ip.com\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402413.3402415"},{"key":"e_1_3_2_1_39_1","unstructured":"Easylist. The goal of easylist is to block ads on english and international sites. https:\/\/easylist.to\/pages\/policy.html."},{"key":"e_1_3_2_1_40_1","unstructured":"EasyList. A primary filter list that removes most adverts from international webpages. https:\/\/easylist.to\/easylist\/easylist.txt. Accessed 2024-04-04."},{"key":"e_1_3_2_1_41_1","unstructured":"EasyPrivacy. An optional supplementary filter list that completely removes all forms of tracking from the internet. https:\/\/easylist.to\/easylist\/easyprivacy.txt. Accessed 2024-04-04."},{"key":"e_1_3_2_1_42_1","first-page":"1631","article-title":"The ip network address translator (nat). Technical report","author":"Egevang K","year":"1994","unstructured":"K Egevang. The ip network address translator (nat). Technical report, IETF RFC 1631, 1994.","journal-title":"IETF RFC"},{"key":"e_1_3_2_1_43_1","volume-title":"Privacy badger. https:\/\/privacybadger.org","author":"Foundation Electronic Frontier","year":"2024","unstructured":"Electronic Frontier Foundation. Privacy badger. https:\/\/privacybadger.org, 2024. Accessed 2025-05-14."},{"key":"e_1_3_2_1_44_1","unstructured":"Digital Element. Netacuity industry-standard geolocation - digital element. https:\/\/www.digitalelement.com\/geolocation\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978313"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54999-1_9"},{"key":"e_1_3_2_1_47_1","unstructured":"Forbes. Are vpns legal? the worldwide guide. https:\/\/www.forbes.com\/advisor\/business\/are-vpns-legal\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0107"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278564"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131380"},{"key":"e_1_3_2_1_51_1","unstructured":"Github. Adblock india. https:\/\/easylist-downloads.adblockplus.org\/indianlist.txt. Accessed 2024-08-04."},{"key":"e_1_3_2_1_52_1","unstructured":"Github. Adblock srilanka. https:\/\/github.com\/miyurusankalpa\/adblock-list-sri-lanka. Accessed 2024-08-04."},{"key":"e_1_3_2_1_53_1","unstructured":"Google Public DNS. Edns client subnet (ecs) guidelines. https:\/\/developers.google.com\/speed\/public-dns\/docs\/ecs. Accessed 2025-09-23."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501247.3531545"},{"key":"e_1_3_2_1_55_1","unstructured":"Data Guidance. Data protection. https:\/\/www.dataguidance.com\/. Accessed 2024-05-05."},{"key":"e_1_3_2_1_56_1","unstructured":"Data Guidance. India - data protection. https:\/\/www.dataguidance.com\/jurisdiction\/india. Accessed 2024-05-05."},{"key":"e_1_3_2_1_57_1","unstructured":"Data Guidance. Understanding india`s new data protection law. https:\/\/carnegieindia.org\/research\/2023\/10\/understanding-indias-new-data-protection-law. Accessed 2024-05-05."},{"key":"e_1_3_2_1_58_1","first-page":"123","volume-title":"Proceedings of the linux symposium","author":"Hawley John","year":"2009","unstructured":"John Hawley. Geodns-geographically-aware, protocol-agnostic load balancing at the dns level. In Proceedings of the linux symposium, pages 123-130. Citeseer, 2009."},{"key":"e_1_3_2_1_59_1","first-page":"1","volume-title":"Proc. NMMC","author":"Huffaker Bradley","year":"2011","unstructured":"Bradley Huffaker, Marina Fomenkov, and KC Claffy. Geocompare: a comparison of public and commercial geolocation databases. Proc. NMMC, pages 1-12, 2011."},{"key":"e_1_3_2_1_60_1","unstructured":"ICO. Data minimisation. https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/childrens-information\/childrens-code-guidance-and-resources\/age-appropriate-design-a-code-of-practice-for-online-services\/8-data-minimisation\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_61_1","unstructured":"imewecable. Imewe (india-middle east-western europe) submarine cable. https:\/\/imewecable.com\/aboutus.jp. Accessed 2024-04-04."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278561"},{"key":"e_1_3_2_1_63_1","unstructured":"IPinfo.io. The trusted source for ip address data. https:\/\/ipinfo.io\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_64_1","unstructured":"RIPE IPmap. Ripe ipmap is the ripe ncc's tool for mapping core internet infrastructure. https:\/\/ipmap.ripe.net\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131387"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2023.101862"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177090"},{"key":"e_1_3_2_1_68_1","unstructured":"kenyanwallstreet. Amazon set to launch an aws local zone in kenya. https:\/\/kenyanwallstreet.com\/amazon-set-to-launch-an-aws-local-zone-in-kenya\/. Accessed 2024-05-05."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278570"},{"key":"e_1_3_2_1_70_1","unstructured":"Sakwa Kombo. How kenyans connect to the internet. https:\/\/techweez.com\/2024\/04\/05\/how-kenya-access-the-internet\/. Accessed 2024-05-05."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579437"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3646547.3688447"},{"key":"e_1_3_2_1_73_1","volume-title":"General data protection regulation. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj","author":"Law European Union","year":"2016","unstructured":"European Union Law. General data protection regulation. https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj, 2016. Accessed 2024-05-05."},{"key":"e_1_3_2_1_74_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Lerner Ada","year":"2016","unstructured":"Ada Lerner, Anna Kornfeld Simpson, Tadayoshi Kohno, and Franziska Roesner. Internet jones and the raiders of the lost trackers: An archaeological study of web tracking from 1996 to 2016. In 25th USENIX Security Symposium (USENIX Security 16), 2016."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15509-8_21"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3404868.3406664"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485983.3494869"},{"key":"e_1_3_2_1_78_1","unstructured":"MaxMind. Industry leading ip geolocation. https:\/\/www.maxmind.com\/en\/home. Accessed 2024-04-04."},{"key":"e_1_3_2_1_79_1","unstructured":"MeasurementLab. Measurement lab: Measure the internet save the data and make it universally accessible and useful. https:\/\/www.measurementlab.net\/status\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00011"},{"key":"e_1_3_2_1_81_1","unstructured":"Netflix. Netflix error m7111-5059. https:\/\/help.netflix.com\/en\/node\/53047. Accessed 2024-04-04."},{"key":"e_1_3_2_1_82_1","unstructured":"Netflix. Netflix says 'you seem to be using a vpn or proxy.'. https:\/\/help.netflix.com\/en\/node\/277. Accessed 2024-04-04."},{"key":"e_1_3_2_1_83_1","unstructured":"Submarine Cable Network. Bharat lanka cable system overview. https:\/\/www.submarinenetworks.com\/en\/systems\/intra-asia\/blcs\/bharat-lanka-cable-system. Accessed 2024-04-04."},{"key":"e_1_3_2_1_84_1","unstructured":"Submarine Networks. There are now 6 submarine cables landing in kenya. https:\/\/www.submarinenetworks.com\/en\/stations\/africa\/kenya. Accessed 2024-05-05."},{"key":"e_1_3_2_1_85_1","unstructured":"Irish Tech News. Why do websites block vpns? https:\/\/irishtechnews.ie\/why-do-websites-block-vpns\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_86_1","unstructured":"NLNOG. Nlnog ring. https:\/\/ring.nlnog.net\/nodes\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_87_1","unstructured":"Nmap. Nmap: the network mapper - free security scanner. https:\/\/nmap.org\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_88_1","first-page":"229","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Nobori Daiyuu","year":"2014","unstructured":"Daiyuu Nobori and Yasushi Shinjo. gate: A public relay system with blocking resistance for bypassing government censorship firewalls. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), pages 229-241, 2014."},{"key":"e_1_3_2_1_89_1","unstructured":"Times of India. Yahoo shuts down news sites in india. https:\/\/timesofindia.indiatimes.com\/business\/india-business\/yahoo-shuts-down-news-sites-in-india\/articleshow\/85651433.cms. Accessed 2024-04-04."},{"key":"e_1_3_2_1_90_1","unstructured":"perfSONAR. perfsonar is the performance service-oriented network monitoring architecture a network measurement toolkit. https:\/\/stats.perfsonar.net\/d\/db0e6ecb-3fe3-46b3-9745-edf6a209e7cf\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_91_1","unstructured":"PlanetLab. Planetlab eu testbed. https:\/\/www.planet-lab.eu\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_92_1","volume-title":"Samaneh Tajalizadehkhoob, Maciej Korczy'nski, and Wouter Joosen. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156","author":"Pochat Victor Le","year":"2018","unstructured":"Victor Le Pochat, Tom Van Goethem, Samaneh Tajalizadehkhoob, Maciej Korczy'nski, and Wouter Joosen. Tranco: A research-oriented top sites ranking hardened against manipulation. arXiv preprint arXiv:1806.01156, 2018."},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/1971162.1971171"},{"key":"e_1_3_2_1_94_1","first-page":"2263","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Ramesh Reethika","year":"2024","unstructured":"Reethika Ramesh, Philipp Winter, Sam Korman, and Roya Ensafi. Calculatency leveraging cross-layer network latency measurements to detect proxy-enabled abuse. In 33rd USENIX Security Symposium (USENIX Security 24), pages 2263-2280, 2024."},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561418"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3517745.3561444"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512223"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101569"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_1_100_1","first-page":"281","volume-title":"DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings 15","author":"Sanchez-Rola Iskander","year":"2018","unstructured":"Iskander Sanchez-Rola and Igor Santos. Knockin on trackers door: Large-scale automatic analysis of web tracking. In Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28-29, 2018, Proceedings 15, pages 281-302. Springer, 2018."},{"key":"e_1_3_2_1_101_1","unstructured":"Scapy. Scapy is a powerful interactive packet manipulation library written in python. https:\/\/scapy.net\/. Accessed 2024-08-04."},{"key":"e_1_3_2_1_102_1","unstructured":"Github Scapy. Scapy is a powerful python-based interactive packet manipulation program and library. https:\/\/github.com\/secdev\/scapy. Accessed 2024-08-04."},{"key":"e_1_3_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.14722\/madweb.2025.23008"},{"key":"e_1_3_2_1_104_1","unstructured":"Semrush. Top websites wcross the web. https:\/\/www.semrush.com\/trending-websites\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111214"},{"key":"e_1_3_2_1_106_1","unstructured":"Similarweb. Top website list. https:\/\/www.similarweb.com\/top-websites\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380239"},{"key":"e_1_3_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392144"},{"key":"e_1_3_2_1_109_1","volume-title":"2010 AAAI Spring Symposium Series","author":"Soltani Ashkan","year":"2010","unstructured":"Ashkan Soltani, Shannon Canty, Quentin Mayo, Lauren Thomas, and Chris Jay Hoofnagle. Flash cookies and privacy. In 2010 AAAI Spring Symposium Series, 2010."},{"key":"e_1_3_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313524"},{"key":"e_1_3_2_1_111_1","volume-title":"Leading countries by number of data centers as of march","year":"2024","unstructured":"Statista.com. Leading countries by number of data centers as of march 2024. https:\/\/www.statista.com\/statistics\/1228433\/data-centers-worldwide-by-country\/. Accessed 2024-05-05."},{"key":"e_1_3_2_1_112_1","unstructured":"Telegeography. Cloud infrastructure map. https:\/\/www.cloudinfrastructuremap.com\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_113_1","unstructured":"Telegeography. Where are the world's cloud data centers. https:\/\/blog.telegeography.com\/where-are-the-worlds-cloud-data-centers-and-who-is-using-them. Accessed 2024-04-04."},{"key":"e_1_3_2_1_114_1","unstructured":"the star.co.ke. Amazon web services development centre launched in kenya. https:\/\/aws.amazon.com\/about-aws\/global-infrastructure\/localzones\/locations\/. Accessed 2024-05-05."},{"key":"e_1_3_2_1_115_1","volume-title":"Yahoo shuts down news operations in india","author":"Today Business","year":"2021","unstructured":"Business Today. Yahoo shuts down news operations in india; yahoo mail continues to operate. https:\/\/www.businesstoday.in\/latest\/corporate\/story\/yahoo-shuts-down-news-operations-in-india-yahoo-mail-continues-to-operate-305215-2021-08-26. Accessed 2024-04-04."},{"key":"e_1_3_2_1_116_1","unstructured":"Tom`sguide. Countries with the strictest vpn laws. https:\/\/www.tomsguide.com\/features\/8-countries-with-the-strictest-vpn-laws. Accessed 2024-04-04."},{"key":"e_1_3_2_1_117_1","unstructured":"Tranco. Tranco list. https:\/\/tranco-list.eu\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.5117\/NECSUS2014.1.VELD"},{"key":"e_1_3_2_1_119_1","unstructured":"Verizon. Ip latency statistics. https:\/\/www.verizon.com\/business\/terms\/latency\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_120_1","unstructured":"VPN.com. Which countries block vpns and why in 2024? https:\/\/www.vpn.com\/guide\/which-countries-block-vpn\/. Accessed 2024-04-04."},{"key":"e_1_3_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278551"},{"key":"e_1_3_2_1_122_1","unstructured":"Dirk Wetter. testssl.sh is a free command line tool which checks a server's service on any port for the support of tls\/ssl ciphers. https:\/\/testssl.sh. Accessed 2024-08-04."},{"key":"e_1_3_2_1_123_1","unstructured":"Whotracks.me. Trackers. https:\/\/whotracks.me\/trackers.html. Accessed 2024-04-04."},{"key":"e_1_3_2_1_124_1","volume-title":"Gdpr - what happened? https:\/\/whotracks.me\/blog\/gdpr-what-happened.html","year":"2018","unstructured":"Whotracks.me. Gdpr - what happened? https:\/\/whotracks.me\/blog\/gdpr-what-happened.html, 2018. Accessed 2024-05-05."},{"key":"e_1_3_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/HotWeb.2016.21"},{"key":"e_1_3_2_1_126_1","unstructured":"WonderNetwork. Global ping statistics. https:\/\/wondernetwork.com\/pings. Accessed 2024-04-04."},{"key":"e_1_3_2_1_127_1","unstructured":"Yahoo. Yahoo stops publication of content in india citing new fdi regulation. https:\/\/ca.movies.yahoo.com\/movies\/yahoo-stops-publication-content-india-044949199.html. Accessed 2024-04-04."},{"key":"e_1_3_2_1_128_1","unstructured":"Yext. People overwhelmingly trust government websites but can the public sector deliver? https:\/\/www.yext.com\/blog\/2021\/12\/people-overwhelmingly-trust-government-websites-but-can-the-public-sector-deliver. Accessed 2024-04-04."},{"key":"e_1_3_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3577923.3583638"},{"key":"e_1_3_2_1_130_1","first-page":"1","volume-title":"Data-tracking on government, non-profit, and commercial health-related websites. Journal of general internal medicine","author":"Zheutlin Alexander R","year":"2021","unstructured":"Alexander R Zheutlin, Joshua D Niforatos, and Jeremy B Sussman. Data-tracking on government, non-profit, and commercial health-related websites. Journal of general internal medicine, pages 1-3, 2021."}],"event":{"name":"IMC '25:ACM Internet Measurement Conference","location":"Madison WI USA","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2025 ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3764427","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:25:44Z","timestamp":1763738744000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3730567.3764427"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"references-count":130,"alternative-id":["10.1145\/3730567.3764427","10.1145\/3730567"],"URL":"https:\/\/doi.org\/10.1145\/3730567.3764427","relation":{},"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}