How to Browse the Web Securely and Privately

Everyone is concerned about Data Privacy these days. DuckDuckGo, an alternative search engine put together a great guide on how to setup your browser (Firefox, Chrome, IE, Safari, and Opera) to browse the web securely and anonymously.

browsers

Their website will also give a nice easy to comprehend description of what each plugin does and whether its for bugs, tacking, encryption, ect..

Common Tracking Methods

[tabs slidertype=”left tabs”] [tabcontainer] [tabtext]Cookies[/tabtext] [tabtext]Flash Cookies[/tabtext] [tabtext]Scripts[/tabtext] [tabtext]Web Encryption[/tabtext] [tabtext]Web Bugs[/tabtext] [tabtext]Referrer Tracking[/tabtext] [tabtext]Browser Fingerprinting[/tabtext] [tabtext]Settings[/tabtext] [/tabcontainer] [tabcontent] [tab]HTTP cookies or “browser cookies” are small pieces of data sent between your Web browser and a Web site, commonly used to track users, even across multiple Web sites. Cookies can be used to help build a profile about you based on the links you’ve clicked and other actions you’ve taken on various Web sites. These profiles can then be used to serve personalized advertisements and search results. However, cookies can also be used for non-tracking purposes, such as storing user settings or keeping you logged in. Learn more about cookies[/tab] [tab]Flash Cookies are a lot like regular browser cookies in that they are small pieces of data stored on a user’s computer by a Web site. Similar to browser HTTP cookies, flash cookies can be used to collect data about you and your Web activity. Also called “LSOs” (Locally Shared Objects), flash cookies are added to your computer when you visit a Web site that uses Adobe Flash. Unlike browser cookies, Flash cookies are not stored in the same location on your computer and are rarely mentioned in Web sites’ privacy policies. Learn more about Flash Cookies[/tab] [tab]Script vulnerabilites are most commonly in the form of JavaScript exploits. JavaScript is a type of programming language commonly used on Web sites and web applications but can be used to maliciously attack a user’s computer through what is known as Cross-site scripting (or XSS). This is where an attacker places a malicious piece of code (the script) on a seemingly benign Web site. After the user enters information or clicks on a link, the script is carried out and the user’s information or activity can be logged by the attacker. Many browsers allow you to disable JavaScript but, as many modern Web sites employ JavaScript, it may cause a loss in the functionality of your browser. Learn more about Scripts[/tab] [tab]You can recognize a secure (Web encrypted) site by its HTTPS:// prefix. Standard sites (non-secure) begin with HTTP://. Web Sites that use HTTPS are ensuring that the communication between them and their users are authenticated in a secure environment and are therefore safer against eavesdropping from attackers. This can be thought of as the sender of a message scrambling the letters of a document. The recipient can only read the document if they have the key to unscramble the message Learn more about Web Encryptions[/tab] [tab]Web bugs are mechanisms to track specific user activities on Web sites. Often unknown to the user, web bugs (also called “tracking bugs”) can come in many different forms such as hidden images. For example, when spam mail is sent out to millions of random addresses, web bugs are often included to track which e-mail addresses are valid by monitoring which messages were opened. Learn more about Web Bugs[/tab] [tab]Web sites can track where their traffic is coming from through the use of referrers (aka HTTP referers). Through HTTP referrers, it’s possible to tell which site a user has just come from, and can also include other user information, sometimes personal (like search terms). Learn more about Referrer Tracking[/tab] [tab]Web Sites and 3rd party trackers can gather information about your browser to uniquely identify you and therefore track you. Things like browser settings, installed plugins, installed fonts, and IP configuration are often combined to create a unique fingerprint that can be used to link users to their devices. A related example would be tracking a person through their physical attributes. It’s difficult to find someone based on 1 descriptor like gender. Adding in other descriptors like–blonde hair, 5ft 7in tall, snake tattoo, and red dress–make it a lot easier to identify that person. Learn more about Browser Fingerprinting[/tab] [tab]Web sites and Web browsers often have settings that can impact your privacy, many which may be on by default. It is therefore useful to review these settings to see if their tracking outweighs their benefits for you personally.[/tab] [/tabcontent] [/tabs]

> Fixtracking

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top