Results 1 to 4 of 4

Thread: Web Anonymity

  1. #1
    skill-less nob0dy's Avatar
    Join Date
    Jun 2015
    Location
    Off The Grid
    Posts
    1,632
    Rep Power
    100

    Web Anonymity

    Web Anonymity






    Test:

    Code:
    https://2ip.io/privacy/
    Test :

    Code:
    https://proxy6.net/en/privacy
    Test :

    Code:
    https://thesafety.us/check-ip








    Geolocation


    Geolocation Meaning


    Geolocation is the identification or estimation of the real-world geographic location of an object, such as a radar source, mobile phone, or Internet-connected computer terminal.


    How does geolocation work on browser?


    IP Geolocation
    Your position is determined based on databases of lookup tables which map IP addresses to locations. The accuracy is typically based on a database which will only return location data accurate to a City or an area within a City. At its most precise though, an IP address can be mapped to a house






    Geolocation purpose :


    Geolocation makes it possible, from any device connected to the Internet, to obtain all types of information in real time and locate the user with pinpoint accuracy at a given point in time. Geolocation technology is the foundation for location-positioning services and location-aware applications (apps). With the number of smartphone users expected to reach 2.66 billion by 2019 and more than 2 million apps available in both the Android and iPhone markets, the prevalence of geolocation technology will only continue to increase.






    Geolocation On All Web Browsers On/Off:


    Code:
    https://www.privateinternetaccess.com/blog/2018/12/how-to-disable-geolocation-in-browsers/

    Code:
    https://www.expressvpn.com/support/troubleshooting/disable-browser-geolocation-sharing/






    iPhone Instructions On/Off :


    Code:
    https://www.softwarert.com/turn-on-off-photo-geolocation-iphone/

    Android Instructions On/Off :

    Code:
    https://www.theverge.com/2019/4/12/18302306/android-101-location-tracking-stop-how-to

    Geolocation Cell Phone Laws By State :: Warrant Laws ::

    Code:
    https://www.aclu.org/issues/privacy-technology/location-tracking/cell-phone-location-tracking-laws-state




    Cross Site Tracking


    Meaning :

    It's exactly what it sounds like: cross-site tracking generally refers to companies collecting browsing data across multiple websites. ... But often, that data also ends up being used behind the scenes to target advertising or create user profiles.


    The new Intelligent Tracking Prevention feature detects and eliminates cookies and other data used for this cross-site tracking, which means it helps keep a person's browsing private. The feature does not block ads or interfere with legitimate tracking on the sites that people actually click on and visit.







    How To Disable On Web Browsers And Cell Phones


    Code:
    https://stopad.io/blog/shut-off-browser-tracking

    How To Disable Cross Site Tracking iPhone

    Code:
    https://ios.gadgethacks.com/how-to/safari-101-block-cross-site-tracking-your-iphone-0180462/

    Prevent Cross-Site Tracking on Mac and iOS

    Code:
    https://support.expcloud.com/portal/kb/articles/prevent-cross-site-tracking-on-mac-and-ios





    Cookies First / Third Party Blocking





    Cookie Meaning:


    A computer “cookie” is more formally known as an HTTP cookie, a web cookie, an Internet cookie, or a browser cookie. The name is a shorter version of “magic cookie,” which is a term for a packet of data that a computer receives, then sends back without changing or altering it. No matter what it’s called, a computer cookie consists of information. When you visit a website, the website sends the cookie to your computer. Your computer stores it in a file located inside your web browser. (To help you find it, this file is often called “Cookies.”)

    Cookies are messages that web servers pass to your web browser when you visit Internet sites. Your browser stores each message in a small file, called cookie. txt . When you request another page from the server, your browser sends the cookie back to the server.



    Code:
    https://clearcode.cc/blog/browsers-first-third-party-cookies/


    Cookie Purpose ?


    A cookie (called an Internet or Web cookie) is the term given to describe a type of message that is given to a web browser by a web server. The main purpose of a cookie is to identify users and possibly prepare customized Web pages or to save site login information for you.



    Are Cookies Bad Should i Care ?


    Code:
    https://www.whoishostingthis.com/resources/cookies-guide/


    How To Block and Turn Them off :



    Code:
    https://www.howtogeek.com/241006/how-to-block-third-party-cookies-in-every-web-browser/


    How to Delete and Control Cookies :


    Code:
    https://www.pcmag.com/article/333088/how-to-control-and-delete-cookies-on-your-browser




    Java





    Java Security Risks

    Oracle's Java poses the single biggest security risk to US desktops, according to a new report from Copenhagen-based security vendor Secunia ApS, because of its penetration rate, number of vulnerabilities, and patch status. According to the report, 48 percent of users aren't running the latest, patched versions.


    Top 10 Java Vulnerabilities And How To Fix Them


    Code:
    https://www.upguard.com/articles/top-10-java-vulnerabilities-and-how-to-fix-them

    Java Version Test :


    Code:
    https://www.java.com/verify/

    How To Disable / Enable Java


    Code:
    https://www.computerhope.com/issues/ch000891.htm







    VPN






    VPN Definition :


    A virtual private network (VPN) is a network that is constructed using public wires — usually the Internet — to connect remote users or regional offices to a company's private, internal network.

    A VPN is a private network that uses a public network (usually the internet) to connect remote sites or users together. The VPN uses "virtual" connections routed through the internet from the business's private network or a third-party VPN service to the remote site or person.


    Why Use A VPN ?


    A VPN (Virtual Private Network) is a great tool to protect your privacy and increase your security on the Internet. It basically connects two computers securely and privately on the internet. A VPN is designed to provide a secure, encrypted tunnel to transmit the data between the remote user and the company network


    Does My ISP Know I am Using A VPN ?


    While using a VPN, your ISP cannot decipher the contents of your internet traffic nor can it figure out where your traffic is traveling to or from. That means your ISP cannot see what sites you visit or anything you do while connected. It can only see that encrypted data is traveling to a server.


    Hot Use A VPN


    Code:
    https://www.wikihow.com/Use-a-VPN

    VPN Leak Test


    Code:
    https://www.astrill.com/vpn-leak-test

    VPN Tests And Checks


    Code:
    https://restoreprivacy.com/vpn-test/
    knowledge is power , power corrupts all .

  2. #2
    skill-less nob0dy's Avatar
    Join Date
    Jun 2015
    Location
    Off The Grid
    Posts
    1,632
    Rep Power
    100
    Google Analytics





    Google Analytics Definition


    Google Analytics is a web analytics service offered by Google that tracks and reports website traffic, currently as a platform inside the Google Marketing Platform brand. Google launched the service in November 2005 after acquiring Urchin.

    As of 2019, Google Analytics was the most widely used web analytics service on the web. Google Analytics provides an SDK that allows gathering usage data from iOS and Android app, known as Google Analytics for Mobile Apps. Google Analytics can be blocked by browsers, browser extensions, and firewalls.

    Google Analytics tracks all of its data by a unique tracking code that you install on every page of your website. This code is a small snippet of Javascript, or a coding language that runs in viewers' browser when they visit those pages


    Google Analytics Disable Tool


    Code:
    https://tools.google.com/dlpage/gaoptout
    Code:
    https://geekthis.net/post/block-google-analytics/

    Turn off Google's location tracking :: Web ::


    Code:
    https://www.techrepublic.com/article/how-to-stop-google-from-tracking-and-storing-your-locations/
    Code:
    https://lifehacker.com/psa-your-phone-logs-everywhere-you-go-heres-how-to-t-1486085759
    Code:
    https://www.theguardian.com/technology/2018/aug/14/how-to-turn-off-google-location-tracking
    Code:
    https://www.msn.com/en-us/news/technology/google-knows-everywhere-you-go-%E2%80%94-heres-how-to-stop-it-from-tracking-you-and-delete-the-logs/ar-BBWhNbL
    Code:
    https://www.pcmag.com/article/345340/how-to-get-google-to-quit-tracking-you

    SMART PHONES

    Code:
    https://www.androidpolice.com/2019/10/08/how-to-fully-disable-google-location-tracking-on-your-smartphone/
    Code:
    https://qz.com/1354967/how-to-stop-google-from-tracking-your-location-data/
    Code:
    https://www.comparitech.com/blog/vpn-privacy/stop-google-apple-microsoft-tracking-location/

    Avoid Google


    Don't Use Gmail Or Google As Your Search Engine Or Google Chrome .


    How To Uninstalled Google As Your Search Engine


    Code:
    https://www.searchenginejournal.com/change-browser-default-search-engine/299891/

    Alternatives To Google Search Engine


    Code:
    https://fossbytes.com/google-alternative-best-search-engine/

    Alternatives to Google Chrome


    Code:
    https://alternativeto.net/software/google-chrome/

    Alternatives To Gmail


    Code:
    https://clean.email/alternatives-to-gmail


    Web Plugins





    Web Plugins Definition

    A plugin is a piece of software that acts as an add-on to a web browser and gives the browser additional functionality. Plugins can allow a web browser to display additional content it was not originally designed to display.

    Browser extensions security risk , Plugins and extensions . Regardless of the origin, plugins and extensions often come with security flaws which attackers can leverage to gain access to your systems or data. These vulnerabilities allow attackers to wreak havoc by, for example, installing ransomware, exfiltrating data, and stealing intellectual property.


    Uninstall or Disable Plugins to Make Your Browser More Secure

    Code:
    https://www.howtogeek.com/209156/uninstall-or-disable-your-browser-plug-ins-to-make-your-browser-more-secure/

    View And Disable Plugin In Any Browser

    Code:
    https://www.howtogeek.com/139916/how-to-view-and-disable-installed-browser-plug-ins-in-any-browser/

    The Risks of Adobe Flash


    Code:
    https://www.abelsolutions.com/risks-adobe-flash/

    Adobe Flash List Of Vulnerabilities


    Code:
    https://www.cvedetails.com/vulnerability-list/vendor_id-53/product_id-6761/Adobe-Flash-Player.html






    TOR





    TOR Browser Definition


    The Tor browser is an internet browser that allows users to surf the web anonymously. It also gives you access to the dark web. Tor is a worldwide network of servers specifically made for private communication.


    What is the Tor Browser? How it works and how it can help you protect your identity online .


    Code:
    https://www.csoonline.com/article/3287653/what-is-the-tor-browser-how-it-works-and-how-it-can-help-you-protect-your-identity-online.html


    Does TOR Really Work ?


    Tor browser is very effective at hiding your location and preventing your traffic from being tracked. It's almost impossible for your online activity to be traced through Tor's network back to you. However, Tor browser is not entirely secure. The system has a few weaknesses.



    How To Protect Your Privacy Online With TOR


    Code:
    https://www.techradar.com/how-to/how-to-protect-your-privacy-online-with-tor-browser-improve-your-security-and-stay-anonymous

    The Ultimate Guide to Tor Browser (with Important Tips) 2019


    Code:
    https://www.vpnmentor.com/blog/tor-browser-work-relate-using-vpn/

    Where To Download TOR


    Code:
    https://www.torproject.org/download/
















    MS

    Do not use Microsoft software that is accessing network shares over the internet (such as Internet Explorer, Edge or Outlook)
    Do not use a Microsoft login for your local Windows machine
    Block outgoing connections on ports 445 and 137-139 on your router/firewall.
    Block outgoing connections on ports 445 and 137-139 to non local ip-address spaces using Windows-Firewall.





    work in progress
    knowledge is power , power corrupts all .

  3. #3
    skill-less nob0dy's Avatar
    Join Date
    Jun 2015
    Location
    Off The Grid
    Posts
    1,632
    Rep Power
    100
    DNS Leaks / Leaking








    Meaning :

    A DNS leak refers to a security flaw that allows DNS requests to be revealed to ISP DNS servers, despite the use of a VPN service to attempt to conceal them.[1] Although primarily of concern to VPN users, it is also possible to prevent it for proxy and direct internet users.

    A DNS leak is a problem with the network configuration that results in loss of privacy by sending DNS queries over insecure links instead of using the VPN connection. A DNS query is a request made by an user to translate the name of a server (a hostname, like www. gmail. com) to an IP address.



    What is a DNS leak and why should I care?


    Most Internet service providers assign their customers a DNS server which they control and use for logging and recording your Internet activities.







    How To Identify And Prevent DNS Leaks

    Code:
    https://hackernoon.com/how-to-identify-and-prevent-dns-leaks-5fa659130a41


    How to Test :

    Code:
    https://www.dnsleaktest.com/

    How to Prevent :

    Code:
    https://www.dnsleaktest.com/how-to-fix-a-dns-leak.html

    Preventing Leaks in a VPN :


    Code:
    https://goyoambrosio.com/2018/06/Preventing-DNS-Leaks-in-VPNs/




    WebRTC









    Meaning: WebRTC (Web Real-Time Communication) is a free, open-source project that provides web browsers and mobile applications with real-time communication (RTC) via simple application programming interfaces (APIs).

    Turn Off reasons : One major reason that why internet users disable WebRTC is because of the fact that it leaks IP addresses of users connected online during real time. Thus, there's this loophole existing when using a VPN that it leaks IP addresses






    How To Turn Off :

    Code:
    https://whoer.net/blog/article/how-to-disable-webrtc-in-various-browsers/


    WebRTC : Test

    Code:
    https://browserleaks.com/webrtc




    FingerPrints





    Definition :

    A device fingerprint, machine fingerprint or browser fingerprint is information collected about a remote computing device for the purpose of identification. Fingerprints can be used to fully or partially identify individual users or devices even when cookies are turned off.”


    Browser Fingerprinting – Explanation & Solutions


    Code:
    https://restoreprivacy.com/browser-fingerprinting/

    How To Block FingerPrinting With FireFox


    Code:
    https://blog.mozilla.org/firefox/how-to-block-fingerprinting-with-firefox/

    FingerPrint Test


    Code:
    https://panopticlick.eff.org/
















    HTTPS Everywhere




    Definition :

    HTTPS Everywhere is a best practice security measure for websites that ensures the entire user experience is safe from online threats. The term simply refers to using HTTPS—the secure web protocol enabled by SSL/TLS—across your entire website instead of selectively.

    HTTPS Everywhere is a Firefox, Chrome, and Opera extension that encrypts your communications with many major websites, making your browsing more secure. Encrypt the web: Install HTTPS Everywhere today. Brave is an Android Browser which includes HTTPS Everywhere as well as great tracker blocking features



    HTTPS Everywhere Browser And Android Extention

    Code:
    https://www.eff.org/https-everywhere










    Work in progress
    knowledge is power , power corrupts all .

  4. #4
    skill-less nob0dy's Avatar
    Join Date
    Jun 2015
    Location
    Off The Grid
    Posts
    1,632
    Rep Power
    100
    Holding for Art




    Work in progress
    knowledge is power , power corrupts all .

 

 

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •