Quantcast
[ 3 / biz / cgl / ck / diy / fa / g / ic / jp / lit / sci / tg / vr ] [ index / top / reports / report a bug ] [ 4plebs / archive.moe / rbt ]

2016/06/28: We're halfway there! 2016/06/15: We've run out of space for images and need to upgrade our storage. Warosu is looking for a sponsor to support this effort. Email "haha at warosu" if interested.

/g/ - Technology


View post   

[ Toggle deleted replies ]
File: 34 KB, 516x237, google_tracking.png [View same] [iqdb] [saucenao] [google] [report]
37951961 No.37951961 [Reply] [Original] [archive.moe] [rbt]

People have been interested in protecting their privacy from google lately, and seeing as how no list of essential extensions has appeared, let me write a selective list of the extensions you might want, how they work, and how they protect you from google.

First of all, let's explain how tracking works, so I don't have to explain it time and time again in every extension description.

Basically, any website that you visit logs your IP. But webmasters of shared servers (that is, most websites) can't access that information easily - for example, if the webmaster is using php, the IPs will be logged in some text files in Apache (the server package that runs the php script), and you can't log that info in a database. So then, to log visit information, the webmasters use two particular web technologies: javascript and/or cookies. Oh, and flash too.

Via javascript and cookies, and flash, a webmaster can know more about you than your IP. Specifically, your browser and OS can be ascertained too.

Alright, so now let's use google analytics as an example of how tracking works. When a webmaster is lazy or is somehow forced to use it, he adds a javascript snippet given to him by google to his website. Said code makes a connection to a google analytics account, that keeps track of what IPs have visited the site, from what countries they came from, what browsers and OSs were in use, etc. This, of course, is kept on google's servers, not on the particular website you're visiting.

>> No.37951976
File: 90 KB, 1264x679, real-time-1317646060.png [View same] [iqdb] [saucenao] [google] [report]
37951976

And this is how google keeps track of you. For every website with google analytics (or, say, jquery linked from a google server, or webfonts stored by google, or google ads), google gets your IP connected to their own servers. So as you go around the web, doing whatever you do, google traces your footprints until your ip changes. And if you have a google account open (be it gmail, youtube, g+, blogger, picasa or whatever else), the pages you visit are easily linked to your IRL name. Which is 100% against the 12th human right you should feel proud to maintain.

By the way, if you make websites, stop using google analytics. Just host your own analytics software, like piwik. Giving away your visitors' privacy to google just because is absolutely retarded.

Anyway, there's another serious problem with google: their original service, google search. Of course, when you use google search, google will keep track of the terms you searched (and link them to the websites you've visited and any open accounts thanks to what I've already explained), but they'll also keep track of the search results you've clicked. And although they will still log what you've searched no matter what you do, their logging of your website visits and search clicks can be circumvented via extensions.

So now let's move to the extensions:

>> No.37951980

>not filtering google traffic on your router

Any other method is needlessly complicated.

>> No.37952004
File: 14 KB, 205x244, 3236129283_d61fb9c429_b[10].jpg [View same] [iqdb] [saucenao] [google] [report]
37952004

First and foremost, RequestPolicy. The idea behind it is pretty simple: if the website you're visiting is trying to make any connections to domains that aren't the same as (via iframes, or javascript script calls, or non-locally hosted web fonts, or anything like that), RequestPolicy stops said connections.

This, of course, can break websites. Like with 4chan - if the connections it makes to google are stopped, you can't input captchas. Or like with most websites there are - that also connect to google because it hosts jquery and a number of web fonts, and the webmasters of said websites are too lazy to keep a copy on their own servers. But you can add exceptions to RequestPolicy, so you can let 4chan make a connection with google for the captchas, but not antisemite forums you visit, for example. Google will know you (or your IP, if you're smart enough not to have google accounts open) are visiting 4chan, but not that you're an antisemite. Unless you visit /pol/. But anyway.

The point is that you can decide what websites you visit will be allowed to connect to tracking domains and what websites won't, and exceptions can be added or taken away in two clicks.

But REMEMBER: once you install it, make sure you set it to block ALL requests, so then you'll be able to add any exceptions you want on the go.

>> No.37952029
File: 38 KB, 400x400, NoScript v2.5 - Award-winning Security Addon.jpg [View same] [iqdb] [saucenao] [google] [report]
37952029

The second one I'll mention is also quite important: NoScript.

What it does is, like RequestPolicy, very simple: It won't allow websites to run javascript or flash. But also like RequestPolicy, you can add exceptions on the go with just a couple of clicks.

Now, RequestPolicy will take care of google analytics, but just in case, it's always a good idea to use NoScript, just in case.

-

The third one is in the same vein as RequestPolicy and NoScript: Cookie Monster.

Cookie Monster lets you manage cookies. You can set it to refuse all cookies by default, and then add exceptions for specific websites. You can even block any cookie that doesn't look a login cookie while still being able to use login cookies in sites you use with an account.

NOW, THIS IS IMPORTANT: cookie monster doesn't block all cookies by default after being installed. You need to open about:addons and modify its preferences to do so. Which is the smart thing to do, you then just add exceptions to the websites you trust instead of trusting everything and only blocking what you distrust (which is how it works out of the box).

>> No.37952042
File: 16 KB, 370x370, 18819.png [View same] [iqdb] [saucenao] [google] [report]
37952042

BetterPrivacy does less than what its name would make you believe, but it's still important when it comes to protecting your privacy. It only does one single thing: it deletes all your flash cookies (which aren't real, normal cookies that you can manage through vanilla Firefox or Cookie Monster) every time you close the page that contains these flash cookies.

Said flash cookies can also be used to track you, so... yeah, using BetterPrivacy is important too. And you can add exceptions too if you trust the site (like, say, if you play mahjong on tenhou's flash client and don't want to type your id every single time you access it. Wish they fucking released a linux version already...)

Anyway, yeah. BetterPrivacy. Use it.

>> No.37952065
File: 6 KB, 64x64, 394968-64.png [View same] [iqdb] [saucenao] [google] [report]
37952065

After RequestPolicy, NoScript and Cookie Monster, the fifth one isn't as essential, but considering how you might add exceptions to certain websites while still not wanting to have ads, it bears mention: AdBlock Edge.

What it does is... well, what its name says. It blocks ads. Also, if you add the EasyPrivacy list to its filter subscriptions, you'll have one extra security layer to block trackers.

Some of you have asked why Edge instead of Plus. And the answer might surprise you. AdBlock Plus, out of the box, shows ads from google, and allows stuff like google analytics to do its thing. It comes with a list of exceptions against your filters, a list it calls "non-intrusive advertisements", that lets google do its thing. And although you can deselect the non-intrusive advertisements list, the fact that you can't trust ABP to have your privacy in mind is apparent.

That's where AdBlock Edge comes in. It's a fork of AdBlock Plus, that removes any factory exception and any other dubious code it finds in ABP. Because to protect your privacy, you should be the only one in control of your exceptions.

>> No.37952084

>>37952029
>but just in case, it's always a good idea to use NoScript, just in case

just in case

>> No.37952091
File: 63 KB, 677x1000, blender.jpg [View same] [iqdb] [saucenao] [google] [report]
37952091

Blender (which isn't a 3D modeling and animation suite) is kinda clever. It randomly changes your info to the most common browsers and OSs, so if after all the protection you're still being tracked, the companies that are tracking you only have your public IP and not a clear footprint on you (it would look like many different computers using the same internet connection have accessed the site for each single time you reload it).

>> No.37952113
File: 14 KB, 360x311, https_everywhere_new_logo.jpg [View same] [iqdb] [saucenao] [google] [report]
37952113

HTTPS Everywhere is important, though it doesn't actually do much against google. But it bears mention due to what it does do.

It forces websites that offer SSL/TLS to actually give you a SSL/TLS. By SSL/TLS, I mean a technology that makes sure your communications with a website aren't being hijacked, and it also encrypts the data you're sending and receiving. Without https in, say, a login, your accounts can be easily stolen. Without ssl while you process a payment, your card info can be stolen in a jiffy. So although this doesn't concern google specifically, it's important to mention.

There are attacks to break https connections, but as far as I know, they all need you to be part of the same local wireless network to work. In escence, an attacker in the same wireless network (and thus sharing your public IP) would fool your wireless card to send its info to his own computer instead of the wireless internet server/router/etc, and then he would reroute it to the correct wireless router, stealing your data without you noticing. Which is reason enough NOT to log in to any account or make any online payments when you're in a public WLAN.

But other than that, https makes your communication secure, so do use HTTPS Everywhere.

>>37952084
Just in case.

Just in case.

>> No.37952115

>>37952004
Why not ghostery? Just make sure to turn off ghostrank and turn on blocking new elements by default.

>> No.37952129
File: 73 KB, 580x388, lightbeam-100066152-gallery.png [View same] [iqdb] [saucenao] [google] [report]
37952129

To keep track of how you've been tracked, you can also use Lightbeam. It makes a chart, showing which websites you've visited (shown inside circles) have connected to domains you haven't, which most likely are tracking you (shown inside triangles, connected to the circles through lines).

While this particular addon doesn't exactly protect your privacy, it lets you know how the sites you're visiting aren't protecting it either, and might also show dangerous exceptions you've missed in those addons that are indeed protecting your privacy.

>>37952115
Coming in 11/13

>> No.37952133

>>37952115
I don't remember, just that they did/do something shady.

>> No.37952138

>>37952115
>trusting an ad company

Are you retarded?

>> No.37952145

>>37952115
>ghostery
>doing anything useful

The only thing you need is ABE and a good set of filters.

>> No.37952148
File: 106 KB, 350x212, 279838719_greasemonkey_firefox_icon_xlarge.png [View same] [iqdb] [saucenao] [google] [report]
37952148

Lastly, you'll need Greasemonkey to use extensions that limit google's tracking on google search.

I use 2 greasemonkey scripts that run on google search.

- Google Search Better Privacy, which sets some google variables (like safesearch to off) without using cookies. And

- GoogleMonkeyR, that adds some functionaly to google search, but what we really care are its anti-tracking option. It isn't on by default, but can be set on the GoogleMonkeyR settings, on the gear menu from google search. If you activate "Disable Google tracking my search results", you'll notice how, next time you click on a link, it won't go through a google link first. That way, although google will still be able to know what we've searched, it won't be able to track what results we've actually visited.
If you don't want the whole set of functionality that GoogleMonkeyR offers, you can always use Google Search Better Privacy. That said, I've found GSBP sometimes fails to give the correct link and still uses google redirects, whereas GoogleMonkeyR hasn't failed for me yet.

Also, if anybody knows about a userscript that removes tracking from google image search links, please, let me know.

Oh, and if you use AdsFight! you'll be able to skip sites like adfly or linkbucks, and go directly to the links you want. They'll still track your IP, but only that.

>> No.37952163

>>37952115
Ghostery cannot be trusted because
1. ad company
2. Closed-source
This should be enough to turn you away from this software.
use Disconnect, it's open-source; you can always trust open-source software when it comes to privacy.

>> No.37952172
File: 49 KB, 850x600, nope.png [View same] [iqdb] [saucenao] [google] [report]
37952172

And a note on Ghostery, DoNotTrackMe and Disconnect: They all pretty much do the same. They block a known list of trackers, and let you know what they've actually tracked. In other words, unlike the essential addons I listed, instead of blocking everything and adding particular exceptions, they only block particular remote connections that are known to be trackers, and let everything else have the benefit of the doubt.

They're... reassuring, given that they actually show you a number of blocked trackers, but I wouldn't recommend them for several reasons. First of all, there's that element of "trust everything unless it's proven to track", which is dangerous. Then, there's the particular reasons:
- Ghostery can't be trusted. They've already been found selling tracking info to companies.
- DoNotTrackMe hasn't gained any distrust yet, but just like Ghostery, it's maintained by a capitalist company instead of a community. We still don't know what will happen.

Disconnect coming next.

>> No.37952205
File: 19 KB, 238x223, disconnect.png [View same] [iqdb] [saucenao] [google] [report]
37952205

- Disconnect looks like the best option, given that the dudes working on it (one of whom used to work for Mozilla in Firefox's security) have already stated that none local information will be ever collected. But Disconnect is made with the normal, non-conscious user in mind. It's made to be easy, not powerful, and that leaves it with a lot of privacy security issues. For example, they have a number of exceptions out of the box, that are supposed to be there because they might break some websites if the exceptions didn't exist, and although it shows you said exceptions and lets you turn them off, it has to be done manually, from website to website.

So the combination of RequestPolicy, NoScript, Cookie Monster and AdBlock Edge with EasyPrivacy turns out much more safe than any of these 3.

>> No.37952227
File: 45 KB, 528x606, 1346451228454.jpg [View same] [iqdb] [saucenao] [google] [report]
37952227

So this is it. If anybody has anything else to recommend, please, go ahead. But do try to explain why we should use them.

Anyway, back to anonymity for me.

>> No.37952235

I like you OP, you are a cool guy. /g/ needs more people like you.

>> No.37952241
File: 318 KB, 1600x1200, 1350407651625.jpg [View same] [iqdb] [saucenao] [google] [report]
37952241

Back to anonymity, I said.

>> No.37952260

>>37952235
Why, thank you.

>> No.37952261

>>37952227
see
>>37951980

>> No.37952262

>>37951980
How do?

>> No.37952272

>>37952113
You have no clue how SSL hijacks work.

>> No.37952299

>>37952261
That would kill necessary functions, like recaptcha.

It's much smarter to just use RequestPolicy blocking everything by default, and then just add particular exceptions.

After all, google isn't the only ad company that tracks you, and as we know, they all share the info with each other.

>> No.37952315

>>37952272
I do.

I, however, have no idea how to explain it to normal people. But I hope I did a good enough work, if only barely.

>> No.37952345
File: 14 KB, 148x148, 1379041723747.jpg [View same] [iqdb] [saucenao] [google] [report]
37952345

>recommending disconnect
>recommending ghostery
>recommending donottrackme


OP is a prismbreak.org shill, we know about your lies you fucking faggot

>> No.37952361

>>37952345
reread this, you fucking retard >>37952205

Also,
>>37952172 They're... reassuring, given that they actually show you a number of blocked trackers, but I wouldn't recommend them for several reasons

>I wouldn't recommend them

>> No.37952401

>>37952163
Not entirely true

Chromium is open source but I wouldn't trust it with my privacy

>> No.37952413

>>37952315

No, he's right. You have no clue how it works. Trying to simplify a concept doesn't require making factually incorrect statements, which you did.

Don't derail your own thread. You don't know what the fuck you're talking about re:SSL MITM attacks, but the rest of the guide was pretty good.

>> No.37952432

>>37952401
Not exactly.

You CAN trust Chromium will breach your privacy rights.

>> No.37952459

>>37952413
Well, thank you, I guess.

I was kinda explaining how sslstrip works. But if you know of any other kind of attack or would like to correct me with the right information, do go ahead. Purpose of this particular thread is to learn, after all.

>> No.37952460

>>37952401
Actually everything google is open source. They even tell you outright that they'll fuck you in the ass if you use their products

>> No.37952461

>>37952413
Can you explain how these work? I'm not entirely sure

>> No.37952483

>>37952241
I remember when this was first posted
That must've been two or three years ago

>> No.37952593

very nice OP!

>> No.37952604

>>37952460

Which i guess means

>you can always trust open-source software when it comes to privacy.

is slightly inaccurate

>> No.37952644

>>37952604
It's still somehow wrong.

The thing is, you can ALWAYS trust open-source software, because you, and many people much better than you at programming, can know what it does.

So it's not that you can't trust it when it comes to your privacy. It's that you CAN trust it to trample all over it.

>> No.37952722

is the addon "pureURL" any good? currently i have a GM script to clean up redireccts and shit. I wish someone made a guide on good privacy based GM scripts

>> No.37952738

>>37952148
>If you don't want the whole set of functionality that GoogleMonkeyR offers, you can always use Google Search Better Privacy. That said, I've found GSBP sometimes fails to give the correct link and still uses google redirects, whereas GoogleMonkeyR hasn't failed for me yet.
Shit. Fuck.

I meant Google Real Link, not Google Search Better Privacy. GSBP sets variables without having to recur to cookies. Google Real Link makes tracking link into normal links, but it sometimes doesn't work, so I switched to GoogleMonkeyR which, as far as I've seen, always works. Other than on images. ;_;

>> No.37952812

>>37952483
What was the original thread about?

>> No.37952845

>>37951980
How do I do this?

>> No.37952903

>>37952845
Depends on the router, but it's just an iptables drop.

See this though >>37952299

>> No.37952989
File: 134 KB, 1071x899, 1336157068165.jpg [View same] [iqdb] [saucenao] [google] [report]
37952989

>>37952241

>> No.37953048

>>37952042
i've got a 'default LSO' called settings.sol, should i keep it or not and why?

>> No.37953131

>>37953048
Don't keep anything unless you trust the site.

>> No.37953260

good work anon, will rebuild my browser plugins

>> No.37953285

>>37952459

>There are attacks to break https connections, but as far as I know, they all need you to be part of the same local wireless network to work.

1. A MITM attack can be carried out at any point between the computer making the request and the destination. The attacker doesn't have to be on the local network, though that's what's most common and easiest.
2. Wireless has nothing to do with it. Public, unencrypted wireless networks are common points of attack, but ARP spoofing can be performed on a local network regardless of whether it's wired, unencrypted wireless, or encrypted wireless.

>> No.37953418

Thank you for the info OP.

>> No.37953436

>>37952129
I cant get this to work, I think it's broken at the moment.

>> No.37953595

>>37951980
>>37952261
>>37952262
>>37952845
>>37952903


>filtering google analytics on your router

What happens when you take your laptop outside your home? EXACTLY. That's why you should redirect google analytics (along with facebook and other shit sites) to your locallost.

>> No.37953801

>>37951961
>for example, if the webmaster is using php, the IPs will be logged in some text files in Apache (the server package that runs the php script), and you can't log that info in a database. So then, to log visit information, the webmasters use two particular web technologies: javascript and/or cookies. Oh, and flash too.
This nigger has no fucking idea what he is talking about.

Firstly, php can definitely log IP address information to a database. No, it is not difficult to access. No, you don't need the Apache logs. Most websites aren't using shitty shared hosts that don't allow you control over Apache anyway, that's 2005 era shit. A VPS costs fucking $15 - $100 per year, at this point shared hosting has almost no reason to exist.

>So then, to log visit information, the webmasters use two particular web technologies: javascript and/or cookies
No. At this point I don't even think he knows what either cookies or javascript are. Cookies are used to store text strings locally on a computer. Websites usually use them to store a session string to uniquely identify a user after they visit once. Because of browser security settings, there are a bunch of rules about how this works. For example, it's restricted to a domain. So (barring any exploits) a website can't read your cookie information from another website. Okay, so how do advertisers target ads to you? They juse javascript, which is a client-side scripting language (server-side javascript exists, but it's irrelevant for the discussion.) This allows them to dynamically load advertisements from a different domain. That second domain (ads.example.com or whatever) can place a cookie on your computer that can be accessed whenever you visit a website that loads ads from (ads.example.com). Since most web advertisers are huge entities, like adsense which is everywhere, they can identify you with the session data in that cookie, look at what page you were visiting, and then they use that to build a profile about you

>> No.37953842

>>37951961
>Specifically, your browser and OS can be ascertained too.
They can ascertain that without Javascript. It's sent in HTTP headers. That's what your User-Agent string is.

>> No.37955888

>>37952065
>Downloading a random fork instead of just untick a fucking checkbox

>> No.37955931

>>37952115
Free Software != Open Source

You can extract the .xpi file with 7-zip and see the source code.

But yeah, Ghostery is NOT free software, and should not be trusted.

>> No.37955956

>>37955931
Shit it was meant for >>37952163

>> No.37955961

>>37955888
It's a matter of trust, google devs. Not that you'd know what that means.

>> No.37956043

>>37952148
>GoogleMonkerR
Don't track me Google is way better :
http://userscripts.org/scripts/show/121923

It also removes the referrer when you click on a google search result.

>> No.37956074

>>37956043
Does it cover image search?

>> No.37956103

>>37956074
Yes.

>> No.37956167

>>37956103
Oh, hey, it does!

Awesome. Thanks, anon.

>> No.37956224
File: 254 KB, 336x426, google employee.png [View same] [iqdb] [saucenao] [google] [report]
37956224

>this faggot is still defending Google and pretending not to be a shill
>mfw this is how Google's public relations acts towards any criticism of its changes

Prepare to laugh and rage:
http://www.youtube.com/watch?v=hTA2yL5HNr4

>> No.37956326

>>37952029
>Cookie Monster
>not Self-Destructing Cookies
Why?

>> No.37956396

No mention of StartPage anywhere? I haven't used google for weeks.

>> No.37956423

>>37956326
Because self-destructing cookies allows every cookie, and then deletes them all when you close the browser. It adds no security whatsoever, and instead becomes an annoyance when it comes to logins.

On the other hand, Cookie Monster blocks all cookies, and then you decide which ones to accept and which ones to refuse in real time, depending on your level of trust towards the website that is giving you said cookies.

>> No.37956541

>>37956224
>getting b8'd

>> No.37956618

>>37956167
You're welcome.

>> No.37956668

>>37956224
>pig squeals
I don't even know what side he's trying to troll. But kill yourself for making me give him a click.

>> No.37956676

>>37955961
What's wrong with AdBlockPlus?

>> No.37956715

>>37956676
Did you even read the fucking OP?

>> No.37956722

>>37956676
The fact that you're a near-illiterate american - or at least behave like one.

>> No.37956801

Nice guide OP, what do you think about RefControl?

https://addons.mozilla.org/en-US/firefox/addon/refcontrol/

>> No.37956829

>>37956715
Don't know for him, but you surely don't read my post in this thread :
>>37955888

>>37956676
Nothing. Just some people who are too retarded to untick a checkbox.

>> No.37956888

>>37956829
You're going in circles, google dev. So have this reply again: >>37955961

>> No.37957067

Man I don't give a single fuck.

All I need is a single adblock. The only reason Google would use my info is for ads and if I block ads it's all for naught

>But they give your personal info to the NSA

No doubt they do but if I ever got into an NSA watchlist for whatever reason I don't think any of these measures would keep me safe from them.

>> No.37957150

Request Policy and NoScript?

I use all the others but should I go for Request policy too? I found the trouble with this was I wasn't sure what stuff was trackers and what was the website.

>> No.37957155

>>37957067
They sell your info to other ad companies too.

Remember, google makes 56 billion (yes, Billion, with a B) dollars a year on targeted advertising.

They milk the everloving shit out of your private data, have no doubt.

So even if you don't care if your government spies on you, how do you feel about ANY company with a couple of bucks for google's pockets spying on you?

>> No.37957211

>>37957150
It's the safest, so you should.

You could simply temporarily allow the websites you're not sure about. You might still be tracked on those particular ones, but at least that's only limited tracking. Which sucks, but that's the best we can have until fucking webmasters start caring for their visitors' privacy.

>> No.37957275

>>37957211

So if you're using both do you have to allow everything in reqest policy and then NoScript too?

>> No.37957352

>>37957275
yep.

But if you're adding only specific extensions instead of temporarily accepting everything, you just have to add each exception once for the rest of your days.

>> No.37957401

>>37957275
Well you don't allow everything obviously, that defeats the purpose. Most things you'll end up allowing are CDN servers for larger sites, and yeah you'll have to allow those in both. Some embedded videos require allowing in both, but it's a one time thing to give them permission, then they'll work for every consecutive visit without any problems.

>> No.37957473

>>37952113
>due to what it does do
the evil that i do do

>> No.37957483

>>37957352
>>37957401

I just don't see the point of using both at the same time though, is it just a back-up? because they both stop the same things so if you let stuff through in one you're probably gonna let it through in the other.

>> No.37957557

>>37957483
They don't do the same thing though, one blocks in site scripting and the other stops off site scripting requests

>> No.37957573

Is there actually ANYTHING that can be done about Google's total hegemony?

Can they be trusted with that amount of power? They essentially have all the dirt on every living human that uses the internet.

>> No.37957581

>>37957557

Oh right. Shit my bad. Okay I see the point then.

>> No.37957585

>>37956888
Please read this again :
>>37955888

>> No.37957606

>>37955961
>>37956888
AdBlock Plus is open-source, you can by definition, trust it.
Just uncheck that checkbox.

>> No.37957624

>>37957606
*and free software

>> No.37957677

So what things should I add to my hosts file for extra tinfoil, I use to have a list of facebook domains but I re-installed 2 weeks ago and haven't done anything like that yet.

also inb4

>uses windows
>expects privacy

>> No.37957691

>>37957677
>>uses windows
>>expects privacy
Exactly

>> No.37957740

>>37956423
What if you turn cookies off by default?

>> No.37957764

>>37952163
>you can always trust open-source software when it comes to privacy

This is usually, but by no means ALWAYS true. Keep in mind that source code should always be audited to be sure no exploits, potential backdoors, or other vulnerabilities or insecurities exist. Simply being open source is not a clean bill of health!

See
http://istruecryptauditedyet.com/

>> No.37957798

what's this ssl observatory?

>> No.37957831

Why is there no addon where you can whiltelist some cookies not to be destroyed but by default all cookies are blocked until you allow them but the ones you allow unless white listed after are destroyed when you close the browser. Because I have to allow some cookies on sites but then I never go back to the site and forget about the cookies and have to delete them manually.

>> No.37957866

>>37957067
then you are an idiot

Great thread OP, love what you doing.

>> No.37957876

>>37957831
You can do just that with a combination of Cookie Monster and Self Destructing Cookies

>> No.37957887

>>37957876

Can you? How?

>> No.37957898

>>37956801
Not OP, but I would definitely suggest it. Just know that you have to add an exception for 4chan to be able to post.

>> No.37957945

>>37957876
>>37957887

I see, this is gonna take a bit of time but it should be perfect.

>> No.37957967

>>37957887

Cookiemonster blocks them, SDC destroys them on browser close, both have whitelists

>> No.37958002

so I don't want to start a browser war, but the only way you get all those addons/extensions/whatever is by using firefox right?

>> No.37958034

>>37958002
Yep. It's the only truly open source browser that respects your freedumbs

>> No.37958041

>>37958002
Yes. Why would that start a browser war? The only ones who would get butthurt over that are Chrome fanboys, and they aren't trying to avoid Google anyway.

>> No.37958293

Thanks OP, this is the best thread on /g/ right now.

>> No.37958496

>>37957677
http://someonewhocares.org/hosts/
then add all the facebooks and stuff.

>> No.37958505

Hot damn, an OP that actually knows his shit. Kudos OP one of the best, well written, and mostly accurate posts I have seen on /g/ in quite some time. Now if only people would follow it.

>> No.37958632

what does it mean "adblock plus is secure but don't forget to uncheck that box"? WHAT BOX?

>> No.37958658
File: 655 KB, 1361x3055, privacy guide.png [View same] [iqdb] [saucenao] [google] [report]
37958658

screencapped for future reference

>> No.37958717

>>37956423
>Because self-destructing cookies allows every cookie, and then deletes them all when you close the browser.

It deletes them all when you close the tab. That's makes cookies useless for tracking without breaking any websites. Combine this with disallowing 3rd party cookies and things are fine.

>> No.37958726

>>37958632
There's a box in the settings to enable/disable ads from companies that pay bribes to adblock plus to allow their ads. You have to uncheck the box or you'll still see those ads. Or just get Adblock Edge, it's exactly the same thing with no bribery setting.

>> No.37958738

>>37958496
Why would I use this list? It blocks a lot of my favorite sites right near the top of its list

>> No.37958814

>>37958658
doesnt work

>> No.37958836

>>37958738
You can just delete those entries if you want to fap to those sites.

>> No.37958852

>>37958814
how do you figure?

>> No.37958912
File: 45 KB, 438x434, Screen Shot 2013-11-10 at 10.47.49 PM.png [View same] [iqdb] [saucenao] [google] [report]
37958912

>>37958726
ok
which one?

>> No.37958973

>>37958912
>os x
ppppfpfpfaahhaahah

>> No.37959003

Why fight it? Google, Microsoft, Apple, and the government are watching you fap. No amount of hiding from the internet while on the internet will change that.

>> No.37959017

>>37958912

What the, for some reason your quote doesn't link correctly. the only one in the thread.

>> No.37959023

>>37958912
It's the non-intrusive advertising box you've already unchecked.

>> No.37959090

>>37959023
i thought so, thank you very much for your help based anon

>> No.37959108

>>37959003
>Google, Microsoft, Apple
But none of those companies see anything I do, except for browsing on 4chan (muh reCaptcha).

>> No.37959114

>>37959003
that shitty defeatist attitude is what got us here in the first place you fuck

>> No.37959124

>>37959003
are you french?

>> No.37959164

These addons make using the internet a chore for no tangible benefit.

>> No.37959174

>>37959124
top kek

>> No.37959207

>>37959003
tu es français? Tu aimes sucer la bite aux socialistes? Je nique ta mère

>> No.37959258

>>37959003
I will make every effort there is to make their work harder to do, out of principle.

>> No.37959368

>>37959258
this is the right mindset, anon

i do everything to fuck them up

>> No.37959792

Just wanna say that I've just now made the switch over to firefox. It doesn't feel as comfortable as chrome does, but I'm sure I'll get used to it.

>> No.37959883

>>37959792
you won't regret it

>> No.37959885

>>37952091
wow, i really like the idea of this

>> No.37959920

>>37957764
I'm sure he meant Free software instead of open-source.

TrueCrypt is not free software.

>> No.37959951

>>37959207
Ferme-là.

>> No.37960131 [DELETED] 

My external hard drive keeps dismounting randomly from my PC. Is it dying or is this some sort of driver or power issue? I'm using Elementary OS and my hard drive is a Western Digital MyBook 640GB.

>> No.37960335

>>37958496
Thank you based anon. I've been meaning to start a thread for a list of hosts, but this takes the cake.

>> No.37960467

>>37953595
>outside

lel

>> No.37960826

>>37955888
>2013
>ABE
>Random


>>>/v/

>> No.37960971

>>37952148
Google/Yandex search link fix https://addons.mozilla.org/en-US/firefox/addon/google-search-link-fix/

>> No.37961330

>>37957573
>Can they be trusted with that amount of power? They essentially have all the dirt on every living human that uses the internet.

>Can a for profit big corporation be trusted to play nice with all this power?


Can the answer be any more obvious? Unless play nice means act like every other successful big corporation such as /g/'s personal faves Microsoft, Intel and Apple. Clearly the endless thirst for money gets in the way of "being nice". Why would anyone expect to trust such massive corporations after everything that has happened in human history...

>> No.37962911

>>37958002
There really is no competition if you care about performance, freedom and addons(extension of freedom).

>> No.37962975

>>37951961
>and you can't log that info in a database.
are you fucking retarded

>> No.37963289
File: 71 KB, 800x600, living in the database.jpg [View same] [iqdb] [saucenao] [google] [report]
37963289

>>37951961
Thank you OP, I moved from Chrome to Firefox.

>>
Name (leave empty)
Comment (leave empty)
Name
E-mail
Subject
Comment
Password [?]Password used for file deletion.
reCAPTCHA
Action