Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Tuesday January 29 2019, @09:19PM   Printer-friendly
from the track-me-not dept.

Arthur T Knackerbracket has found the following story:

The Mozilla Foundation has announced its intent to reduce the ability of websites and other online services to track users of its Firefox browser around the internet.

At this stage, Moz's actions are baby steps. In support of its decision in late 2018 to reduce the amount of tracking it permits, the organisation has now published a tracking policy to tell people what it will block.

Moz said the focus of the policy is to bring the curtain down on tracking techniques that "cannot be meaningfully understood or controlled by users".

Notoriously intrusive tracking techniques allow users to be followed and profiled around the web. Facebook planting trackers wherever a site has a "Like" button is a good example. A user without a Facebook account can still be tracked as a unique individual as they visit different news sites. Mozilla's policy said these "stateful identifiers are often used by third parties to associate browsing across multiple websites with the same user and to build profiles of those users, in violation of the user's expectation". So, out they go.

Of course, that's not the only technique used for cross-site tracking. As detailed in Mozilla's policy, some sites "decorate" URLs with user identifiers to make the user identity available to other websites. Firefox isn't yet ready to block that kind of behaviour, but Mozilla said: "We may apply additional restrictions to the third parties engaged in this type of tracking in future."

Sites will be able to use URL parameters for activities such as advertisement conversion tracking, the policy said, so long as that isn't abused to identify individuals.

Mozilla has also flagged browser fingerprinting (tagging an individual by the fonts they have installed is the most familiar example) and supercookies for future removal.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by MichaelDavidCrawford on Wednesday January 30 2019, @12:07PM (1 child)

    by MichaelDavidCrawford (2339) Subscriber Badge <mdcrawford@gmail.com> on Wednesday January 30 2019, @12:07PM (#794006) Homepage Journal

    If you use it as a master key to encrypt your disk, then any attempts to unlock your disk must take place on your box.

    That is, it would not work to copy a disk image to a Beowulf Cluster Of National Securities.

    --
    Yes I Have No Bananas. [gofundme.com]
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 2) by urza9814 on Wednesday January 30 2019, @05:27PM

    by urza9814 (3954) on Wednesday January 30 2019, @05:27PM (#794140) Journal

    Either they copy your files remotely over the network -- in which case the TPM doesn't matter -- or they get physical access to your box to image the drive -- in which case, they can copy or confiscate the TPM too.