Archiv: browser (de / en)


27.09.2022 - 01:10 [ Erich Moechel / fm4.ORF.at ]

In Brüssel hat das Match um Data-Mining begonnen

Alle nur denkbaren Plattformen für Möglichkeiten zur interpersonellen Kommunikation sollen verpflichtet werden, nicht nur weite Teile ihres Datenverkehrs auf Vorrat zu speichern, sondern auch Daten zu erheben – etwa von persönlichen Chats – die bisher nicht gespeichert wurden. Diese auf Vorrat gespeicherten, zu riesigen Volumina aggregierten Daten sollen dann in einem neu zu errichtenden „EU Centre“ mit Data-Mining und KI-Anwendungen – beides gehört organisch zusammen – auf sogenannte „Kinderpornographie“ durchsucht werden. Tatsächlich wird diese Centre, das obendrein auf dem Gelände von Europol in Den Haag angesiedelt werden soll, ein europäisches Kompetenzzentrum für Überwachung mit Methoden aus dem Komplex Big-Data, Data-Mining und sogenannter „Künstlicher Intelligenz“. Diese Verordnung sollt noch im Herbst im EU-Parlament auftauchen.

24.09.2022 - 23:55 [ Euractiv.com ]

EU’s contempt for encryption puts all Europeans at risk

Every Internet user will find themselves more easily surveilled by the state and other actors. For Central and Eastern Europeans, where analogue surveillance and political retaliation were conducted within their lifetimes, the proposal would be a depressing rollback of the freedoms hard-won by previous generations.

Members of the LGBTQ+ community, abuse survivors, refugees, and minority groups that are the targets of discrimination or attack, will no longer find refuge on the Internet. Professions such as journalists, who depend upon encryption to keep themselves and their sources safe, will be less able to investigate corruption and criminality. The murders of Slovak journalist Ján Kuciak and Maltese journalist Daphne Caruana Galizia in recent years are a reminder of the high stakes for reporters who are exposed.

21.09.2022 - 12:05 [ UN.org ]

The right to privacy in the digital age – Report of the Office of the United Nations High Commissioner for Human Rights

56. With this in mind, OHCHR recommends that States:

(a) Ensure that any interference with the right to privacy, including hacking, restrictions to access and use of encryption technology and surveillance of the public, complies with international human rights law, including the principles of legality, legitimate aim, necessity and proportionality and non-discrimination, and does not impair the essence of that right;

(b) Conduct human rights due diligencesystematically, including regular
comprehensive human rights impact assessments, when designing, developing, purchasing, deploying and operating surveillance systems;

(c) Take into account, when conducting human rights due diligence and
assessing the necessity and proportionality of new surveillance systems and powers, the entire legal and technological environment in which those systems or powers are or would be embedded; States should also consider risks of abuse, function creep and repurposing, including risks as a result of future political changes;

(d) Adopt and effectively enforce, through independent, impartial and well-resourced authorities, data privacy legislation for the public and private sectors that complies with international human rights law, including safeguards, oversight and remedies to effectively protect the right to privacy;

(e) Take immediate measures to effectively increase the transparency of the use of surveillance technologies, including by appropriately informing the public and affected individuals and communities and regularly providing data relevant for the public to assess their efficacy and impact on human rights;

(f) Promote public debate of the use of surveillance technologies and ensure meaningful participation of all stakeholders in decisions on the acquisition, transfer, sale, development, deployment and use of surveillance technologies, including the elaboration of public policies and their implementation;

(g) Implement moratoriums on the domestic and transnational sale and use of surveillance systems, such as hacking tools and biometric systems that can be used for the identification or classification of individuals in public places, until adequate safeguards to protect human rights are in place; such safeguards should include domestic and export control measures, in line with the recommendations made herein
and in previous reports to the Human Rights Council;

(h) Ensure that victims of human rights violations and abuses linked to the use of surveillance systems have access to effective remedies. In relation to the specific issues raised in the present report, OHCHR
recommends that States:

Hacking

(a) Ensure that the hacking of personal devices is employed by authorities only as a last resort, used only to prevent or investigate a specific act amounting to a serious threat to national security or a specific serious crime, and narrowly targeted at the person suspected of committing those acts; such measures should be subject to strict independent oversight and should require prior approval by a judicial body;

Encryption

(b) Promote and protect strong encryption and avoid all direct, or indirect, general and indiscriminate restrictions on the use of encryption, such as prohibitions, criminalization, the imposition of weak encryption standards or requirements for mandatory general client-side scanning; interference with the encryption of private communications of individuals should only be carried out when authorized by an independent judiciary body and on a case-by-case basis, targeting individuals if strictly necessary for the investigation of serious crimes or the prevention of serious crimes or
serious threats to public safety or national security;

Surveillance of public spaces and export control of surveillance technology

(c) Adopt adequate legal frameworks to govern the collection, analysis and sharing of social media intelligence that clearly define permissible grounds, prerequisites, authorization procedures and adequate oversight mechanisms;

(d) Avoid general privacy-intrusive monitoring of public spaces and ensure that all public surveillance measures are strictly necessary and proportionate for achieving important legitimate objectives, including by strictly limiting their location and time, as well as the duration of data storage, the purpose of data use and access to data; biometric recognition systems should only be used in public spaces to prevent or
investigate serious crimes or serious public safety threats and if all requirements under international human rights law are implemented with regard to public spaces;

(e) Establish robust well-tailored export control regimes applicable to surveillance technologies, the use of which carries high risks for the enjoyment of human rights; States should require transparent human rights impact assessments that take into account the capacities of the technologies at issue as well as the situation in the recipient State, including compliance with human rights, adherence to the rule of law,
the existence and effective enforcement of applicable laws regulating surveillance activities and the existence of independent oversight mechanisms;

(f) Ensure that, in the provision and use of surveillance technologies, public-private partnerships uphold and expressly incorporate human rights standards and do not result in an abdication of governmental accountability for human rights.

21.09.2022 - 11:47 [ Netzpolitik.org ]

Client-Side-Scanning: UN-Menschenrechtskommissar erteilt Chatkontrolle deutliche Absage

(19.09.2022)

Der UN-Menschenrechtskommissar hat sich in einem Bericht zum „Recht auf Privatsphäre im digitalen Zeitalter“ (PDF auf unserem Server), der sich mit Trojanern wie Pegasus, der Rolle von Verschlüsselung sowie der Überwachung öffentlicher Räume beschäftigt, kritisch gegenüber der Technologie des Client-Side-Scannings ausgesprochen. Diese ist im Rahmen der Einführung einer Chatkontrolle in der EU als Überwachungstechnologie im Gespräch.

11.09.2022 - 17:57 [ Browserleaks.com ]

SSL/TLS Client Test

The page shows the SSL/TLS capabilities of your web browser, determines supported TLS protocols and cipher suites and marks if any of them are weak or insecure, displays a list of supported TLS extensions and key exchange groups.

11.09.2022 - 17:57 [ itigic.com ]

So deaktivieren Sie alte TLS-Protokolle in Windows und Browsern

(01.02.2022)

Es gibt Internetprotokolle die vor ein paar Jahren sehr notwendig waren, um navigieren zu können, aber mit der Zeit unsicher und obsolet geworden sind. Dies geschieht mit den Protokollen SSL 3.0, TLS 1.0 und TLS 1.1. Nach und nach haben die meisten Browser sie verworfen, aber einige sind immer noch standardmäßig in aktiviert Windows. In diesem Artikel erklären wir, wie wir sie sowohl in Browsern als auch im System selbst deaktivieren können.

11.09.2022 - 15:20 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

11.09.2022 - 15:12 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

11.09.2022 - 14:50 [ Techspot.com ]

A Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes

(August 15, 2022)

The Five Eyes (FVEY) surveillance alliance includes the following countries:
– Australia
– Canada
– New Zealand
– United Kingdom
– United States

(…)

The Nine Eyes countries include:

– 5 Eyes countries +
– Denmark
– France
– Netherlands
– Norway

(…)

The 14 Eyes surveillance countries include:

– 9 Eyes countries +
– Germany
– Belgium
– Italy
– Sweden
– Spain

18.08.2022 - 11:55 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

18.08.2022 - 11:50 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

02.07.2022 - 18:04 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

02.07.2022 - 17:58 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

30.06.2022 - 08:16 [ AVM.de ]

Filterlisten für Internetseiten erstellen

Tragen Sie die Adressen der Internetseiten, deren Aufruf Sie verbieten bzw. erlauben wollen, in der jeweiligen Filterliste ein:

1. Klicken Sie in der Benutzeroberfläche der FRITZ!Box auf „Internet“.
2. Klicken Sie im Menü „Internet“ auf „Filter“.
3. Klicken Sie auf die Registerkarte „Listen“.
4. Klicken Sie neben der benötigten Liste auf den Link „bearbeiten“.
5. Tragen Sie die Internetadressen ohne Präfix wie http, https oder www in das Eingabefeld ein. Drücken Sie nach Eingabe jeder Adresse die Leertaste.

Beispiel:
poker.com xxx.com aggro.tv
Klicken Sie zum Speichern der Liste auf „Übernehmen“.

Jetzt sind die Filterlisten eingerichtet.

27.06.2022 - 01:34 [ RedHuntLabs.com ]

Millions of Secrets Exposed via Web Application Frontend – An Internet-Wide Study

(14.06.2022)

A very interesting highlight to notice here is that Google services, viz. Google reCAPTCHA, Google Cloud, and Google OAuth consumed a major portion – totaling almost 70% of the services where the secret exposure was the highest.

An eye-opening perspective regarding Phase 1 was that in spite of these domains in scope belonging to the top 1 million domains of the internet, the secret exposure was massive.

(…)

Since we majorly focused on the front-end, we anticipated that a majority of the exposures would be through the JavaScript files. Analyzing the results, we found out that almost 77% of the exposures occurred through the JavaScript files being used in the frontend code.

Since most of the JavaScript was being served through content delivery networks, we decided to map the exposures to their sources and extract out insights from our data. The highest number of exposures came from Squarespace CDN leading to over 197k exposures.

30.04.2022 - 18:37 [ Browserleaks.com ]

SSL/TLS Client Test

The page shows the SSL/TLS capabilities of your web browser, determines supported TLS protocols and cipher suites and marks if any of them are weak or insecure, displays a list of supported TLS extensions and key exchange groups

30.04.2022 - 18:17 [ itigic.com ]

So deaktivieren Sie alte TLS-Protokolle in Windows und Browsern

(01.02.2022)

Es gibt Internetprotokolle die vor ein paar Jahren sehr notwendig waren, um navigieren zu können, aber mit der Zeit unsicher und obsolet geworden sind. Dies geschieht mit den Protokollen SSL 3.0, TLS 1.0 und TLS 1.1. Nach und nach haben die meisten Browser sie verworfen, aber einige sind immer noch standardmäßig in aktiviert Windows. In diesem Artikel erklären wir, wie wir sie sowohl in Browsern als auch im System selbst deaktivieren können.

30.04.2022 - 17:25 [ addons.mozilla.org ]

Cloud Firewall

Block connections to pages and web resources hosted in major cloud services if the user wishes to do so. Supports blocking Google, Amazon, Facebook, Apple, Microsoft and Cloudflare.

30.04.2022 - 17:13 [ addons.mozilla.org ]

Disable WebRTC

WebRTC leaks your actual IP addresses from behind your VPN, by default.

30.04.2022 - 16:56 [ addons.mozilla.org ]

Chameleon

Spoof your browser profile. Includes a few privacy enhancing options.

30.04.2022 - 16:50 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

31.03.2022 - 20:50 [ addons.mozilla.org ]

User-Agent Switcher

Pretending to be a different browser can be useful in a number of different situations:

– Some web pages require you to log in or buy a subscription to view their content, but give full read access to search engines.
– Some web pages determine whether you’re using a mobile or desktop browser based on your user-agent.
– Some web pages require you to use a specific browser to access their site.
– And potentially more…

31.03.2022 - 20:44 [ addons.mozilla.org ]

Disable WebRTC

WebRTC leaks your actual IP addresses from behind your VPN, by default.

31.03.2022 - 20:35 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

31.03.2022 - 19:21 [ tenable.force.com ]

How to check for TLS version 1.3 in Linux, Windows, and Chrome

(Dec 8, 2020)

Due to the retirement of OpenSSL v1.0.2 from support. This will result in the addition of support for TLS v1.3 and its cipher suites, as well as 37 new cipher suites for TLS v1.2. There are several performance and security enhancements in TLS v1.3 when upgraded products are at both ends of the connection.

21.01.2022 - 15:02 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

21.01.2022 - 14:52 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

21.01.2022 - 14:35 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

03.01.2022 - 20:51 [ addons.mozilla.org ]

Touch VPN – Secure VPN proxy for unlimited access

Unblock any blocked website and stay secure with Touch VPN. One-click connect to unrestricted browsing through our fast VPN connection. Unlimited bandwidth and completely FREE!

03.01.2022 - 20:49 [ TouchVPN.net ]

TOUCH VPN – Choose your platform

TouchVPN is is available for all devices. Sign up, install, and press connect.

01.01.2022 - 20:20 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

21.10.2021 - 17:12 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

19.10.2021 - 20:22 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

19.10.2021 - 20:12 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

19.10.2021 - 09:12 [ PrivacyTools.io ]

Privacy Tools – Encryption Against Mass Surveillance

You are being watched. Private and state-sponsored organizations are monitoring and recording your online activities. privacytools.io provides services, tools and knowledge to protect your privacy against global mass surveillance.

24.09.2021 - 17:02 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

24.09.2021 - 16:49 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

30.07.2021 - 07:21 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

30.07.2021 - 07:17 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

11.06.2021 - 10:01 [ free-proxy.cz/en/ ]

Free Proxy

There are currently … proxy servers in our database

06.06.2021 - 12:35 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

06.06.2021 - 12:32 [ Browserleaks.com ]

What Is My IP Address

IP address:
Hostname:
Country:
State/Region:
City:
ISP:
Organization:
Connection Type:
Timezone:
Local Time:
Coordinates:

IPv6 Leak Test:
IPv6 Address:

WebRTC Leak Test:
Local IP address:
Public IP address:

DNS Leak Test:
Test Results Found …
Your DNS Servers:

24.03.2021 - 17:09 [ free-proxy.cz/en/ ]

Free Proxy

There are currently … proxy servers in our database

24.03.2021 - 17:06 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

24.03.2021 - 17:03 [ Browserleaks.com ]

What Is My IP Address

DNS Leak Test

Test Results:

24.03.2021 - 16:01 [ tenable.force.com ]

How to check for TLS version 1.3 in Linux, Windows, and Chrome

(Dec 8, 2020)

Due to the retirement of OpenSSL v1.0.2 from support. This will result in the addition of support for TLS v1.3 and its cipher suites, as well as 37 new cipher suites for TLS v1.2. There are several performance and security enhancements in TLS v1.3 when upgraded products are at both ends of the connection.

03.03.2021 - 20:11 [ Netzpolitik.org ]

Warum Google Cookie-Tracking abschafft

Ein Update in Googles Browser Chrome soll in wenigen Wochen einer verbreiteten Form der Datensammelei im Netz ein Ende bereiten. Doch der vermeintliche Schlag gegen Tracking könnte die Dominanz Googles stärken, glauben Beobachter:innen.

03.03.2021 - 12:07 [ free-proxy.cz/en/ ]

Free Proxy

There are currently 7156 proxy servers in our database

03.03.2021 - 12:04 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

03.03.2021 - 12:00 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

17.02.2021 - 18:02 [ DeviceInfo.me ]

Device Info

Device Type / Model:

Operating System:

True Operating System Core:

Browser:

True Browser Core:

Browser Build Number / Identifier:

IP Address (WAN)

Tor Relay IP Address:

VPN IP Address:

Proxy IP Address:

Hostname:

Location:

Country:

Region:

City:

Latitude & Longitude:

Geolocation:

……………………………

17.02.2021 - 17:56 [ Browserleaks.com ]

Browserleaks.com

It has long been believed that IP addresses and Cookies are the only reliable digital fingerprints used to track people online. But after a while, things got out of hand when modern web technologies allowed interested organizations to use new ways to identify and track users without their knowledge and with no way to avoid it.

BrowserLeaks is all about browsing privacy and web browser fingerprinting. Here you will find a gallery of web technologies security testing tools that will show you what kind of personal identity data can be leaked, and how to protect yourself from this.

18.01.2021 - 15:50 [ DNSprivacy.org ]

DoT servers

Oct 2020: The list below has been updated to retain only those servers that appear to still be actively maintained

18.01.2021 - 15:47 [ securitymagazine.com ]

Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

(06.02.2020)

Obviously, time will tell if DoT continues to prevail or whether DoH will start to gain ground. As mentioned at the beginning of the article there is a hot debate going on right now about the direction the Internet industry should take. Suffice to say that even nation state authorities are involved in the debate, which speaks to the level and importance of the discussion.

27.11.2020 - 14:25 [ dnsleaktest.com ]

DNS leak test

Hello (…)

from (…)

27.11.2020 - 13:59 [ addons.mozilla.org ]

Disable WebRTC

WebRTC leaks your actual IP addresses from behind your VPN, by default.

27.11.2020 - 13:58 [ Browserleaks.com ]

WebRTC Leak Test

To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.

To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.

27.11.2020 - 13:55 [ SpyOff.com ]

Turn off WebRtc and surf anonymously

(20.12.2017)

This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.

27.11.2020 - 13:37 [ HowToGeek.com ]

How to See (and Disable) the Telemetry Data Firefox Collects About You

Type about:config into the address bar and then hit the Enter key. The page loads with a warning about the impacts of changing these preferences and the effect it can have on Firefox. Click the “Accept the risk and continue” button.

In the search bar, type each of the following preferences and then set them to the value provided to the right:

devtools.onboarding.telemetry.logged = false
toolkit.telemetry.updatePing.enabled = false
browser.newtabpage.activity-stream.feeds.telemetry = false
browser.newtabpage.activity-stream.telemetry = false
browser.ping-centre.telemetry = false
toolkit.telemetry.bhrPing.enabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.firstShutdownPing.enabled = false
toolkit.telemetry.hybridContent.enabled = false
toolkit.telemetry.newProfilePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.shutdownPingSender.enabled = false
toolkit.telemetry.unified = false
toolkit.telemetry.updatePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.unified = false
toolkit.telemetry.archive.enabled = false
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.bhrPing.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true

05.08.2020 - 08:44 [ Firefox Browser Addons ]

CanvasBlocker

Alters some JS APIs to prevent fingerprinting.

05.08.2020 - 08:42 [ Browserleaks.com ]

HTML5 Canvas Fingerprinting

Canvas is an HTML5 API that is used to draw graphics and animations on a web page via scripting in JavaScript.

But apart from this, the canvas can be used as additional entropy in the web browser’s fingerprinting and used for online tracking purposes.

05.08.2020 - 07:57 [ Firefox Browser Addons ]

Anon browser

Randomize key browser attributes to avoid fingerprinting and user tracking.
The attributes such as user-agent are altered just enough to have different values at each request while minimizing the impact on the browsing experience.

05.08.2020 - 07:48 [ Browserleaks.com ]

WebRTC Leak Test

To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.

To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.

05.08.2020 - 07:41 [ SpyOff.com ]

Turn off WebRtc and surf anonymously

(20.12.2017)

This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.

01.06.2019 - 14:26 [ reddit ]

Government officials admit they can’t enforce a planned ‚porn block law‘ in the UK because of DNS encryption

The UK wants everyone to hand over their personal details to get „age verified“ before looking at adult content… but an official has now admitted it could be almost unenforceable due to the rollout of DNS encryption on Firefox and maybe Chrome.