The Supercookie
With the other kind of cookie, the supercookie, we can distinguish 2 kinds. One is also known under different names: “Flash cookie” or “Local Shared Objects” or LSOs. Flash cookies are found in video ads store information in a similar way to regular cookies but are stored in different locations on your system.
The other kind of supercookie is a bit more malicious, these originate from your ISP. These cookies are not stored on your own system, making them impossible to remove. ISP’s use them to recognize each device and know what it is doing online. Because these are not stored on your own system, you have very few options to stop an ISP who wants to sell your data. This only works when the user uses HTTP instead of HTTPS. These trackers use the X-UID-Header.
The UID-Header tracking works as follows: When the user device sends an HTTP request to the destination server, the ISP injects an HTTP-Header (“X-UIDH”) before the request reaches the destination server. The website then directs the request to Ad Exchange, where advertisers can make a (paid) API call to the ISP which in turn maps the header to a temporary ID and returns the ID and/or advertising segments. This only works when the user connects to the destination using HTTP, if the user uses HTTPS the connection is encrypted, which means the ISP can not utilize this technique.