privacy_protection
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
privacy_protection [2021/03/16 21:06] – [Tracking methods] hc9 | privacy_protection [2023/07/19 06:08] (current) – [Privacy protection] hc9 | ||
---|---|---|---|
Line 20: | Line 20: | ||
* Like standard cookies, but done with Adobe Flash. Check the [[http:// | * Like standard cookies, but done with Adobe Flash. Check the [[http:// | ||
* Zombie cookies | * Zombie cookies | ||
- | * Yet another cookie type. This one's particular, though. It will be recreated even if the user has deleted it. Actually, it's not just a single cookie, like the HTTP or flash types. Other storage mechanisms will additionally be used (e.g., HTML5 Storage, Silverlight Isolated Storage, Web cache|history, | + | * Yet another cookie type. This one's particular, though. It will be recreated even if the user has deleted it. Actually, it's not just a single cookie, like the HTTP or flash types. Other storage mechanisms will additionally be used (e.g., |
* Web bugs | * Web bugs | ||
* A small or invisible object (like a 1x1 pixel image) is put into a web site or e-mail message which is loaded from a third party. Read the [[http:// | * A small or invisible object (like a 1x1 pixel image) is put into a web site or e-mail message which is loaded from a third party. Read the [[http:// | ||
- | |||
* Browser fingerprinting | * Browser fingerprinting | ||
- | * Your browser can send information that makes could make your system uniquely identifiable. See http:// | + | * Your browser can send information that makes could make your system uniquely identifiable. See http:// |
+ | * XXX | ||
- | Even if you don't care about online privacy, you should be aware of the fact that some of the above techiques can be used to impersonate you. See, for instance, an article about [[http:// | + | Even if you don't care about online privacy, you should be aware of the fact that some of the above techiques can be used to impersonate you. See, for instance, an article about [[wp>HTTP_cookie# |
So far we have seen some of the hidden risks to your online privacy that don't require you to do something in particular, just that you browse the internet. There are also various activities that are based on the information you explicitly give (though, of course, the methods discussed above still apply): search engines and social networks. | So far we have seen some of the hidden risks to your online privacy that don't require you to do something in particular, just that you browse the internet. There are also various activities that are based on the information you explicitly give (though, of course, the methods discussed above still apply): search engines and social networks. | ||
Line 52: | Line 52: | ||
* [[http:// | * [[http:// | ||
- | $Id: privacy_protection.html, | + | $Id: privacy_protection.html, |
privacy_protection.1615928809.txt.gz · Last modified: 2021/03/16 21:06 by hc9