Your browser can reveal an alarming amount of information about you.
Surprisingly enough, or not too surprising, when you visit a website there is a surprisingly large amount of identifying data being sent to the website you are communicating with.
Cookies are pieces of information that a web site can send to your browser.
If your browser “accepts” them, they will be sent back to the site every time the browser accepts a page, image or script from the site.
A cookie set by the page/site you’re visiting is a “second party” cookie.
A cookie set by another site that’s just providing an image or script (an advertiser, for instance), is called a “third party” cookie.
Cookies are the most common mechanisms used to record the fact that a particular visitor has logged in to an account on a site, and to track the state of a multi-step transaction such as a reservation or shopping cart purchase.
As a result, it is not possible to block all cookies without losing the ability to log into many sites and perform transactions with others.
Unfortunately, cookies are also used for other purposes that are less clearly in users’ interests, such as recording their usage of a site over a long period of time, or even tracking and correlating their visits to many separate sites (via cookies associated with advertisements, for instance).
With recent browsers, the cookie setting that offers users the most pragmatic tradeoff between cookie-dependent functionality and privacy is to only allow cookies to persist until the user quits the browser (also known as only allowing “session cookies”).
Tails does this automatically by the way with Iceweasel.
Recent Cookie-Like “Features” in Web Browsers
In addition to the regular cookies that web browsers send and receive, and which users have begun to be aware of and manage for privacy, companies have continued to implement new “features” which behave like cookies but which are not managed in the same way.
Adobe has created “Local Stored Objects” (also known as “Flash Cookies”) as a part of its Flash plug-ins; Mozilla has incorporated a feature called “DOM storage” in recent versions of Firefox.
Web sites could use either or both of these in addition to cookies to track visitors.
It is recommended that users take steps to prevent this.
Managing Mozilla/Firefox DOM Storage Privacy.
If you use a Mozilla browser, you can disable DOM Storage pseudo-cookies by typing about:config into the URL bar.
That will bring up an extensive list of internal browser configuration options.
Type “storage” into the filter box, and press return.
You should see an option called dom.storage.enabled.
Change it to “false” by right-clicking and choosing Toggle.
Managing Adobe Flash Privacy.
Adobe lists advice on how to disable Flash cookies on their website.
There are some problems with the options Adobe offers (for instance, there is no “session only” option), so it is probably best to globally set Local Stored Object space to 0 and only change that for sites which you are willing to have tracking you.
On the Linux version of Adobe’s Flash plugin there does not seem to be a way set the limit to 0 for all sites and therefore its use should be limited or avoided.
Luckily Tails does not have flash installed, but in case you are not using Tails be aware of this.
If you absolutely need to watch a video online, find a way to download the video to your computer and watch it that way.
This takes the browser out of the loop of processing a video for you and eliminates those Flash cookies which help identify you.
Sometimes it is simply used to make webpages look flashier by having them respond as the mouse moves around or change themselves continually.
Then as you hop around from site to site with your finger print, correlations and patterns can be drawn from this and eventually linked to you if you are not extremely careful.
Needless to say, it is not always possible to browse with Tails, so these are things you need to be aware of when you are browsing with regular browsers on your native OS with your browser of choice.
See what your browser is revealing about you at this page below.
Do not visit it from your real IP address, since this page will be linked to the Silk Road forums from the moment I make this post part of my thread.
As a result, you may wish to search online for other sites that check what information your browser is revealing about you.
If you are confident in your OpSec abilities, use the one below.
Latest posts by Tarquin (see all)
- How To Access The Dark Web - September 20, 2016
- Evolution Market Exit Scam - March 18, 2015
- Iran blacklists Tor network, knocking 75 percent of users offline - July 31, 2014