Jump to content
Not connected, Your IP: 18.208.126.54

Search the Community

Showing results for tags 'tracking'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Frequently asked questions
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP
    • Mirrors
    • Net Neutrality Monitor

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 5 results

  1. Hello, The VPN client uses a network lock, but can these techniques capture my person info: blurb: When a user opened the spreadsheet, it would silently connect to a server controlled by police. Investigators would receive their real IP address, and not the anonymous IP address they would otherwise be assigned by Tor. and have embedded tiny invisible images inside emails for years to track who opens their emails, at what time, and from where. How do I protect myself from this? Thanks, Mr. V
  2. CLIQZ GmbH is a start-up based in Munich, Germany, developing the web browser Cliqz. Cliqz focuses on two things: An integrated "advanced" tracking protection feature which rewrites "unsafe" tracking links to fixed fake ones. If you are using CLIQZ, your tracking data would be mixed with those of other users, making it harder to identify you as a specific user with a specific profile. A revamped search feature powered by Human Web, a web index by CLIQZ to which other users passively contributed. In short, they seem to have edited the relevancy calculation a bit so that the ways how users interact with the search results are more important than technical things like links. It can redirect your search queries through CLIQZ' proxy servers. Their location is not documented.Some thoughts: 1. and 3. can easily be integrated into the regular Firefox as well via extensions, so it's not that new. 2. might be interesting, but building a search index the way they do it requires data from users. Besides, it directs the search query to another search engine if the user couldn't find what he was looking for. They added an about:transparency page which lists all the data your usage of the browser generated. But they completely removed addon support for security reasons, so you can't install things like NoScript which, ironically, would contribute to your security.. Cliqz can be downloaded from its website. Current version is 1.0.2 based on FF 44.0.2 (as of post date, not edit date). Update: Mozilla officially announced a strategic investment into Cliqz GmbH, the developer of the browser CLIQZ.
  3. Hello everyone, I'm not sure if you have heard that Verizon (VZW) has been, for the past two years, inserting a perma-cookie into HTTP traffic headers via means of a UIDH. The UIDH ignores: private browsing, do not track, even Verizon's own opt-outs. I have assembled some links below to provide you some more information regarding this issue. AFAIK, AirVPN users are safe from VZW tracking. You are also safe on sites that use HTTPS. According to some comments in the various articles (links to articles below), it appears at least AT&T is doing the same thing as VZW. Reddit: /r/Privacy Verizon & ATT injecting UIDH Verizon adding UIDs: Hacker News Wired: Verizon's Perma Cookie kills privacy DSLreports: Verizon Perma Cookie WebPolicy: Verizon Tracking Header LessonsLearned: Test for Cellular tracking Beacons (must be on cellular network) This issue highlights the need for net neutrality and encryption! anonym
  4. This is an excellent talk about current fingerprinting methods that don't need to rely on cookies or user agent strings. It also sheds light on how ineffective certain kinds of "privacy-enhancing" addons are at spoofing user-identifiable information - in some cases they even increase the risk of being uniquely fingerprinted. Link to video at SecurityTube.net: http://www.securitytube.net/video/8943
  5. I have been having this problem with Google, It ALWAYS knows my location. Even under the most strict conditions I cannot seem to hide from them. Here are my current settings: VPN enabled OpenDNS configured Cookies and cache cleared Location awareness disabled in firefox and osx Wired ethernet connection, Wifi disabled Flash disabled Javascript disabled Cookies disabled Java disabled Furthermore, if I use Tor Browser but disable Tor using Torbutton Google knows my location. I have tested for DNS leaks and find none. I find this incredibly invasive and want to block them but cannot seem to find a way. Does anyone have any suggestions?
×
×
  • Create New...