Sunday, April 17, 2016

Four ways to protect themselves from tracker online – Swedish YLE

By installing special additions you can make it much more difficult for advertising to build up a profile of you online. You can also choose to block third-party cookies and take a couple of other tricks.

Yle News told earlier this week about how the tracker comes with what you read on the net and targeted advertising to you on the basis of it – with using cookies, or cakes.

Here are some practical tips on how you can minimize this tracing process and to protect your privacy on the Internet.



1) Block third-party cookies

You can set browser to block third-party cookies, then cookies coming from sites other than the one actually surfing. These cookies are most commonly used to track you and target advertising.



 Tracker mapper

Several sites use the same tracker. Tracker mapper photo: F-Secure

Some browsers accept them by default. It may for example be because they do not want to offend the advertising industry.

  • In Firefox, you can block third-party cookies in Settings – & gt; Privacy.
  • In Google Chrome, you can do so in Settings – & gt; Show Advanced Settings – & gt; Content Settings. Select “Block cookies and site data from third parties”.
  • The browser Internet Explorer has a corresponding function under Tools – & gt; Internet Options – & gt; Privacy.
  • Safari: Settings – & gt; Privacy protection. At the “Block cookies and other data from websites”.

While it is important to be aware that there are also some third-party cookies can be beneficial and are not there to track your Internet habits . Blocking can thus also make your Internet surfing less smoothly.



2) Use browser extension that blocks tracker

Two excellent additions to the tracker, the Disconnect and Privacy Badger.



Disconnect

Disconnect blocks, for example, two trackers at Loviisa site. Disconnect

They help to protect you from tracking and make it much more difficult for commercial operators to identify your interests and surfing habits. In addition, they also protect against malicious code that can accompany advertising.

Disconnect is faster to protect yourself effectively, while Privacy Badger builds up its defenses eventually as you browse.

Disconnect is available for all major browsers, that is Chrome, Firefox, Internet Explorer and Safari, while the Privacy Badger has only been developed for Chrome and Firefox.

– this kind of supplement increases enough, the user’s anonymity and the personal integrity. I can recommend Disconnect and Privacy Badger in good conscience, says IT security expert Nils Hjärpe.

Ghostery is another popular option, but the company behind it has been criticized for selling user data to advertisers through Ghosterys additional function “Ghost rank “.

3) Use the secure network Tor

the browser Tor locks your network traffic through different places in the world which makes it very difficult to track you.

Tor-n & # XE4; tverket

Tor network

Tor is a network designed to protect, among other journalists and dissidents, but is also used by criminals. In the server-end can possibly see the traffic in plain text, but it has its origin is quite protected.

– A website in the US, for example, believe that you are in Amsterdam and consequently can send you a local ad from a restaurant in the Dutch capital. This is a small indication of how well Tor works, comments Hjärpe.

Especially the completed application package (Tor Browser) available on the Tor project website is easy to use also for beginners.

Tor works on Windows, Linux and OS X. A version for the Android smart phones are also available.



4) Browsing with Firefox browser

Firefox is based on open source which means that the greater is the users who control what the program does – not a company that wants to control the user.

– Anyone can check the code to see if it contains non-essentials. Source code can of course be several million lines so it is not something you do just like that incidentally. But everything is visible and it is unlikely that any developer deliberately creating malware, says Hjärpe.

He added that commercial software, however, is based on closed code and the user does not have a clue about what’s happening under the hood.

– Of course, behaves most of the commercial software correctly, but some have enough built-in functions for a “call home” feature that transfers more or less anonymous information to the manufacturer, says IT security expert Nils Hjärpe.

For the same reason, use Hjärpe himself the Linux operating system, based on open source, and not Microsoft or Apple systems.



Read also

LikeTweet

No comments:

Post a Comment