privacy_protection
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Next revisionBoth sides next revision | ||
privacy_protection [2021/03/16 22:19] – [Resources] hc9 | privacy_protection [2022/12/05 06:09] – hc9 | ||
---|---|---|---|
Line 20: | Line 20: | ||
* Like standard cookies, but done with Adobe Flash. Check the [[http:// | * Like standard cookies, but done with Adobe Flash. Check the [[http:// | ||
* Zombie cookies | * Zombie cookies | ||
- | * Yet another cookie type. This one's particular, though. It will be recreated even if the user has deleted it. Actually, it's not just a single cookie, like the HTTP or flash types. Other storage mechanisms will additionally be used (e.g., "HTML5 Storage", | + | * Yet another cookie type. This one's particular, though. It will be recreated even if the user has deleted it. Actually, it's not just a single cookie, like the HTTP or flash types. Other storage mechanisms will additionally be used (e.g., "HTML5 Storage", |
* Web bugs | * Web bugs | ||
* A small or invisible object (like a 1x1 pixel image) is put into a web site or e-mail message which is loaded from a third party. Read the [[http:// | * A small or invisible object (like a 1x1 pixel image) is put into a web site or e-mail message which is loaded from a third party. Read the [[http:// | ||
Line 27: | Line 27: | ||
* XXX | * XXX | ||
- | Even if you don't care about online privacy, you should be aware of the fact that some of the above techiques can be used to impersonate you. See, for instance, an article about [[http:// | + | Even if you don't care about online privacy, you should be aware of the fact that some of the above techiques can be used to impersonate you. See, for instance, an article about [[wp>HTTP_cookie# |
So far we have seen some of the hidden risks to your online privacy that don't require you to do something in particular, just that you browse the internet. There are also various activities that are based on the information you explicitly give (though, of course, the methods discussed above still apply): search engines and social networks. | So far we have seen some of the hidden risks to your online privacy that don't require you to do something in particular, just that you browse the internet. There are also various activities that are based on the information you explicitly give (though, of course, the methods discussed above still apply): search engines and social networks. |
privacy_protection.txt · Last modified: 2023/07/19 06:08 by hc9