armedarmedのブログ -3ページ目

armedarmedのブログ

ブログの説明を入力します。

Who peeping our online privacy1993 年 7 5 March, Top Design Nike Air Force 1 Low Womens Red White Shoes in the 'New Yorker' published a picture of the famous cartoon 'On the Internet, nobody knows you're a dog.' To describe the anonymity of the Internet. However, even a decade ago, saying this has also been the irresponsible. Of course, this article is not to discuss how to protect against viruses, but can not be a professor agent skills. But do not take conditions, we are not like the concept of privacy as an excuse, as long as your stuff, before leaving the computer, is yours. Figure 1, 'On the Internet, nobody knows you're a dog' accurate advertising (also called targeted advertising) definitely not for advertisers to collect user information to collect user information, they miss the money day and night. 10 pre-Internet advertisers have been collecting user information, closest to the user needs to push information. This makes the Internet industry is so advanced. Therefore, the concept of privacy, in fact, is unique and individual. Any content relevant to you is likely to be private, nothing more than that can be linked directly to the content of your identity information and, more important and sensitive. Now advertisers have been able to integrate a large number of user information, to perform optimum guess. A famous example is, Gmail will be based on the user's mailbox contents, showing the most relevant ads by automatic algorithm. Such ads are everywhere now. The actual example of FIG. 2, IE9 tracking protection list of individuals we take an example IE9: Microsoft quietly in IE8 called InPrivate Filter provides a tool; in IE9 inside, it was renamed Air Jordan 6 to great fanfare Tracking Protect List (Tracking Protection List), the user can enable it permanently. Do a little experiment: Open in TPL personal list, do not import any custom TPL list, does not use private browsing mode (InPrivate browsing). 1. Open a navigation website, the link on its home page on each site are open again. 2, then return to your personal list TPL, the original blank into a bunch of blacklist: on the left there is 51yes, alimama, baidu, cnzz, doubleclick, googleadservices, google syndication, imrworldwide, qq, scorecardresearch, weibo, wrating right side the frequent log, stat, ads, beacon and other terms, and like, followbutton point as long as you learn English, you can guess more or less content and statistics, somewhat related advertising. Also, you seem to have seen somewhere like button. Etc., this list of most visited sites just Latest Nike Air Force 1 High Unisex Black White Shoes can not, not to mention you probably do not know them. IE how will know that they exist, but also vowed to tell you, these are automatically blocked? Figure 3, IE9 prevent third-party to gather information that comes with the development tools, open IE, Sina home, for example, see what happens What: Developer Tools display, track protection to prevent these third party (ie not Sina) website to send data. Such a request is blocked, and the link which has this to say s = 1920x1080x32l = zh-cn this sentence is to say, the author of the current display setting is 1920 × 1080 pixels, 32-bit color depth, language is zh-cn (Chinese Simplified Chinese mainland ). What does this mean it (this can be seen in the various statistical services, content network of business) in accordance with the industry's common practice, when you enter Sina home while you also tell Wrating (million Swiss data), Imrworldwide ( Nielsen), Mediav (poly wins Wanhe) and Google Analytics (Google statistics) these elements: 1. Where are you from (ip address), with what language, from which page to 2015 Latest Nike Shoes jump to 2, you Sina Home How long, concerned about what part (thermal been a very popular figure) 3, where you will go next (click the link on which page) 4, your display resolution setting is what 5, your browser installed what plug-ins (plugin, note, non-browser extensions --extension) then, these four companies will be in your browser to leave their mark, so in the future as long as you use to access the website of their operations, they will be able to recognize you. This marker is called Cookie, it is a small piece of data, the website by saving cookie in the browser to identify the user, Mozilla once called exquisite taste. When you visit each site using the same statistical service providers, it means that he has complete know your surfing habits. Globally there, Google Analytics is such a statistical service providers. This also is not easy to just your surfing habits and the reality of your association together. So some people (often gather party information) that this is not personal privacy. If social networking is just in front of the third-party statistics every family, then it may make incredible: First, you are willing to tell it who you are enrolled in which school, who lives where, somewhere to work; then, in order to prevent hacking , you have to tell it your phone number; in order to maintain the link between your old school, you also upload the address book. The key is, that is what you willingly. What, you say people have a privacy policy author:? Spilled water is not being paid. Share button you do not click, they at least know the reality of your visit to this site; Once you click, they'll know you're concerned about the reality of this page. Its value is inestimable. This share button way than quietly gather information more humane, in any case, users will always know exactly what there is on his visit to third-party content pages. Of course, you also can not refuse to collect such information, unless the use of special tools. Figure 4, for example share button: Valentine's Day just past, MOMO saw Blue Star variety show affection, unbalanced mind, so are online browsing various Wang star's photo. Figure 5, MOMO: how do you know it is Wang Wang star who, Wang High Quality Nike Force 1 Mens White Blue Shoes would like to know how marriage MOMO:? Ma Ma, a lot of photographs, Wang should count, but come. Ma Ma: MOMO: Ma Ma, how do you know it is to marriage of Wang Wang saw a few pictures but only?. Ma Ma: In fact, Wang star who MOMO browse photos in the process, so many things happened. Figure 6, MOMO is a third-party service providers receive accurate advertising record browsing history MOMO, which speculated that he Air Jordan 10 may find the object, then, MOMO received a matrimonial advertisements. How to suppress submit personal information submitted is inevitable to the first party information, after all, you are also using other people's services; provide information to a third party, however, it is usually not necessary, can be shot at this point. Unfortunately, most information leaks designed to protect such tools are Mozilla Firefox and Google Chrome exclusive. If you are using the country's three kings (IE6, IE8,360 secure browser, only their share of over 20%, the data provided by the CNZZ), most of the time you have to feel powerless and frustrated. Automation tools: 1. Tracking Protection (TPL), applies to Microsoft Internet Explorer 9 (8) Tracking Protection is a very handy tool for privacy protection previously mentioned. It is automated, simply enable your personal list, it will block in the background silently upload information to third parties. Use InPrivate Filter in IE8 may need to modify the registry. TPL is actually a set of tools content strategy, and therefore better able to import the customized list. Users can get several common filter configuration in TPL subscription at Microsoft official, such as EasyPrivacy, to more effectively prevent the sending of your browsing history to third parties. Some places also offer a suitable and TPL spam filter configuration, however, is limited by the performance of TPL, you can not expect TPL in this regard can be reached in Adblock Plus effect. Personal List TPL principle is: When IE9 in more than (the default is 3) find the same content from a third-party site when the page, TPL will be automatically added to your personal list the contents. When the content again to form a third party, IE9 will prevent access to it, thereby preventing unnecessary information leakage. 2, Do Not Track Plus tracking protection means there is a problem in the track to prevent the social network, you can not use the like button in some sites at the same time, to prevent additional acts of third-party information collected on the site of social networks. This Firefox extension to solve the above problems. You can easily set rules for different sites, so that social networks, advertising agencies can only record your message on a defined site. Figure 7, Do Not Track Plus 3, Adblock (applies to Google Chrome), Adblock plus (suitable for Firefox, Google Chrome), and others this is a tool used to filter advertising in a sense, to prevent tracking and stop advertising is a matter. Both Chrome extension actually more professional, they are used to filter this ad. In fact, there is no similar function in addition to the individual list, they are far more powerful content TPL policy management tool. In such a mode subscription, their effect is best. Adblock Plus is in fact on Earth the largest number of users browser extension, only on Firefox to have reached almost 15 million daily active users. The Adblock on Chrome Web Store, but also in addition to several official google shortcuts, the most popular extensions. Easylist, EasyPrivacy, Chinalist peer list from the outset for the Adblock Plus design. As for antivirus, security software provides filtering, you can also through a number of automated tools, these lists will be translated into a compatible version to use. 4, Noscript (applies to Firefox), ScriptNo (applies to Google Chrome) in the collection of user information to third parties, mainly rely on to perform some javascript program implemented in the user's browser. Both browser extension can let the user decide browser javascript code which can be executed from the domain name, browser plug-ins and other elements. When unnecessary third-party components, the two extensions will give prompt the user to decide whether to stop them running. Each of these two tools and some unique features for advanced to use. Use them correctly requires a certain knowledge of the Internet. Figure 8, NoScript 5, RequestPolicy or Firefox extensions, it is suitable for professional, or there is a clear need (as against CSRF) users. It is bound by a network request via the source and target, to control access to all content. This is a big kill, provides a very strict control, as a routine use, it is expensive. Figure 9, RequestPolicy 6, browser privacy modes limit the browser history browser cookie privacy mode is turned on, it will not send out existing cookie information. In particular Internet service login account before, statistics, advertisers will be difficult to know your identity. Restrict cookie recording can achieve a similar effect. As the price, you need to pay the cost of the loss of browsing history. 7, there are a number of advertising companies formed an alliance that allows users to track the status is set to do. Most readers do not expect, this list is only google analytics with operations in the country. Why not three kings browser? You do not find them tools applicable, even if there is an Air Jordan 13 extension for the ad filtering is not universal grammar, and no one is writing, translation corresponding rules. IE8's InPrivate Filter function and IE9's Tracking Protection (TPL) are identical. However, you must modify the registry to keep it running, in addition, it is not compatible TPL filtering rules. Almost all of the programs are focused on Mozilla Firefox, Google Chrome top. It is worth mentioning that there is a lot of Chromium clone, they are often compatible with Chrome extensions. As for how to judge cloning Chromium, here to quote from the 'Apple APP Audit Guide', then: Supreme Court judges had the words: I am naturally aware of when it occurs. Blocking the cost of third-party information recorded: If MOMO really completely blocked advertisers Record your information will happen: 10, after blocking the provision of information to a third party, MOMO received inappropriate ad Although the suppression of information leakage, but it is also created for itself MOMO; for advertisers, advertisers, it is a waste. For no one to please. On the other hand, the number of users to be in control of these privacy protection tool, always want to waste some time; because of design flaws or might cause the normal operation of the page; the same time, most of these tools is to use javascript to write, the efficiency is generally not high (even with JIT), it will slow down the speed of the browser. Secondly, they are often written in his spare time developers, the code quality is not guaranteed, it is not possible for large-scale stability testing (except very popular tool), are more likely than the average software will bring new vulnerabilities . The author's view is inseparable from the Internet to collect information to third parties, but you can always be within the capability range, to prevent unnecessary parts. Now the network is unlikely to be anonymous, but access to personal information should be cost. Imprint 1, comic 'On the Internet, nobody knows you're a dog' is July 5, 1993 彼得施泰纳 on 'New Yorker' published occurrence in this case of fair use. 2, thanks bearsun @ weibo provides the text of the Satsuma dog MOMO photos. Some of the icons 3. Mozilla Firefox and other names may be trademarks and other copyrighted. Appendix: Chromium clone: ​​those for secondary development based on Chromium source code, and have similar interface with Chromium browser. Their expansion interface usually identical Chromium, Google Chrome, so you can use the extension provided in the Chrome webstore. Chromium is Google led the development of the open source browser, because the open source terms (BSD, etc.) it uses relatively loose, with Google Chrome's popular, so there are a lot of clones Chromium. Google Chrome is Google on the basis of Chromium, adding a number of proprietary products after the code. Browser plug-ins (plguin) and expansion (extension) file extension (Extension) those underlying the browser's ability to utilize and expanded browser support program. Plugin (Plugin) often refers to the use of the browser itself does not have the ability to assist the program. Let's say Adblock Plus for Chrome use Extension.WebRequest API Chrome provides the content intercept is extended; Adobe Flash Player through ActiveX / NPAPI / PPAPI browser interface provides the ability to play Flash content, it is a plug. All aids mentioned in the text are extended, or the browser itself have the ability. Source: fcerebel contribute.