We just launched a new Web-privacy-related webapp, and want to show it off to you.
There are over 20 tests to extract various kinds of information from the browser's history; the most obvious application is to check for visits to the most popular websites and blogs, which we grouped into categories (banks, pr0n sites, dating sites, social networks, etc.) We're also monitoring for more sensitive content, such as all visited Wikileaks articles and administrative pages, visited .gov and .mil websites, as well as Google search queries and zipcodes typed into forms. In addition to that, we're indexing over fifty most popular RSS newsfeeds (including Boing Boing, of course) to determine which recent news stories the user has read; also, for social news sites, we're trying to determine the user's username by detecting visited profile pages.
We also meticulously documented the problem and listed possible solutions in hope of educating casual Web users as well as browser vendors about this issue. Most people still have no idea that such history detection is possible, and in fact trivially easy to implement; what's worse, there are no simple ways to protect against this (other than disabling history altogether). I hope that by publicizing the issue we can get browser vendors to figure out sane ways of solving the problem to make our browsing histories private again, and would appreciate your help.
Paul Strasburger sits in the House of Lords as a Libdem peer; he sits on the Joint Select Committee that is the latest Parliamentary group to scrutinise the Investigatory Powers Bill (AKA the Snoopers Charter) and, as with the previous investigations, he’s concluded that the spying bill is a dangerous, poorly drafted, overbroad dog’s breakfast.
Rocky Houston was a felon in possession of a gun, and is headed to jail for years for that crime. How did they catch him? They installed a video camera on a utility pole near a family-owned property until useful footage was captured. A federal appeals court upheld his conviction this week, with Judge John […]
A basic best-practice for email servers is to use TLS (Transport Layer Security) when they connect to one another, which guards against “man in the middle” attacks that would allow attackers to read or change emails while they travel between mail-servers.
Light used to just be one of two things: on or off. Simple as that. Either a flood of yellow or total darkness. Then the dimmer switch happened and you could adjust the brightness to meet your seductive needs and suddenly everyone looked a little better in the gentler light. And now your luminary universe […]
Projects will always need management. And now with the tech gold rush it feels like there are more projects than ever with fewer managers than there’s demand for. But it takes too much time and money to go back to school full time so luckily the Project Management Professional certification training course is now 96% […]
If you’ve been blessed enough to avoid them yourself, you’ve definitely heard the horror stories. Late night, crushing out a ton of work, writing, coding, anything, then boom – your computer crashes. The battery blows, you spill water or coffee all over the place, or it just shuts down with no explanation, and you’re screwed. […]