Search Mailing List Archives


Limit search to: Subject & Body Subject Author
Sort by: Reverse Sort
Limit to: All This Week Last Week This Month Last Month
Select Date Range     through    

[liberationtech] Trackography

ɣęƈƞą vecnamcclaudio at gmail.com
Thu Jan 8 07:56:12 PST 2015


On Thu, Jan 8, 2015 at 4:35 PM, Aymeric Vitte <vitteaymeric at gmail.com>
wrote:

>
> It does, it sends things without telling you, for safebrowsing,
> certificates check or just tracking or services you did not ask for if you
> did not deactivate them, the image comes from [1] project which was
> proxying to a server, you can check this with your browser using a proxy or
> just with something like wireshark.
>
>
aah, I see, no then. my browser is not sending that things, because I've
deactivate them all :)


> It's not marginal and I think should be included in the stats.
>

it is marginal for the project goal. indeed is not marginal for the user.
also if I don't know if these connection contain browser unique identifier
(beside the stuff sent in an HTTP request)

One of the side goal of the project, is show that current business model of
the online media -beside few notable exception- is basically damaging for
the citizen privacy.

so I agree that browsers with these defaults, are sending a lots of stuff.
but this is out of scope for our analysis.
If we've to address all the stuff sent automatically, I'll cover for first
the browser, and for second the antivirus server location :) they collect
URLs and filename executed to sent them across the world without asymmetric
crypto...


>
> The Testers will have to install two things but the results will be more
> realistic than with a server only solution.
>
>
thanks for the hint! :)

Claudio
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.stanford.edu/pipermail/liberationtech/attachments/20150108/974a2dc5/attachment.html>


More information about the liberationtech mailing list