Questions tagged [tracking]
126 questions
6
votes
2 answers
Can government track VPN traffic if it has control on both ISP and website server?
Let's say I access a website called example.com with VPN.
Here's the flow: me → ISP → VPN → example.com
Do typical VPN providers use the same IP address to receive data from ISP and send data to the destination server (example.com)?
If that is the…
Max
- 175
- 2
- 5
6
votes
0 answers
How does Facebook Pixel's new first-party cookie work?
Facebook recently announced that they will begin offering a first-party cookie option for the Facebook Pixel. Previously, they only used third-party cookies. From their documentation:
You can now use both first and third-party cookies with your…
Flimm
- 1,230
- 3
- 13
- 22
6
votes
2 answers
Why do browsers expose installed fonts?
It's a well known fact (in the privacy-aware community, at least), that a factor quite used for tracking is the list of installed fonts, which browsers seem to expose, and trackers exploit this.
There's lots of questions and answers as to how to…
WhyNotHugo
- 208
- 1
- 9
6
votes
0 answers
Can I use disk encryption and track my device at the same time, in case it's stolen or lost?
I would like to encrypt a single user profile but have been told EFS isn't the solution.
I have a laptop that I leave in my bag and use for work and private purposes. I want to secure data in case my laptop is stolen or lost, and also I would like a…
Braxton Fland
- 61
- 2
5
votes
1 answer
Untraceable software development
My goal is to develop a piece of software which is illegal in my country. Obviously I don't want anyone to be able to trace the code back to me or prove that I developed it after deployment.
What precautions would be needed? Which pitfalls need to…
wuerfelfreak
- 153
- 3
5
votes
2 answers
How does the Random Hardware Access function work on a smartphone?
Certain smartphones and laptops, one of which my Windows 10 Phone and Laptop (Windows 10, redstone 1 update) have a function called "Random Hardware Access" under the WiFi settings.
The settings has the following explanation for this function:
Use…
Lighty
- 2,368
- 1
- 23
- 36
5
votes
6 answers
If a hacker were to obtain a shipping tracking number what could be compromised?
Lets assume you just bought something and it is getting shipped via a major package shipping agency (such as FedEx or UPS etc.). You are given a tracking number which you can use to view where the package is. Now somehow a hacker is able to obtain…
Eric Johnson
- 715
- 1
- 6
- 11
5
votes
2 answers
Is it possible to identify the source of message in whatsapp?
Is it possible to identify the real source of message in whatsapp?
Scenario :
Texting whatsapp message to a group,one of the group member forwards it to another and it goes on atlast one day it reaches me again.
Questions :
Now as a end user, I can…
BlueBerry - Vignesh4303
- 5,107
- 13
- 34
- 63
5
votes
1 answer
Does the use of JavaScript make ProtonMail insecure?
I like the look of ProtonMail. However, what has stopped me from signing up is that JavaScript seems to be used at various points in the site, and for someone to read your email they must click on a link to what I believe is a JavaScript page?
For…
k1308517
- 1,272
- 14
- 27
5
votes
1 answer
Third-Party-Cookies Tracking - Google Chrome
I've read an article about third-party-cookies which explained that in Google Chrome disabling third-party-cookies will not stop the browser from sending third-party-cookies. So when I visit Facebook every day and get first-party-cookies from them,…
maxeh
- 346
- 3
- 15
4
votes
1 answer
Is Verizon Still Injecting Perma-Cookies into Customer Traffic?
This article was published in 2014. Is Verizon still doing this to customer data? It makes sense to assume they are, but I'm hoping for some kind of official news article or something to validate its continued existence.
user194659
- 41
- 1
3
votes
3 answers
Is it possible to track someone by sharing a youtube link with timestamp?
Is it possible to track someone by sharing a youtube link with them with a timestamp such as &t=1s if they click on it on their end?
I've recently have been told not to use timestamps because of this...
Joel Portillo
- 39
- 2
3
votes
2 answers
My company sent a phishing email - can they see if I saved the attachment?
My company is doing an anti-phishing campaign and sent out a "fake" email to see how many people would open the attachment. They had previously sent out information about how to avoid these kind of attacks.
So of course I recognized the email as…
glassy
- 131
- 1
3
votes
1 answer
What information can WiFi devices leak without actually connecting?
Mr Paranoid walks from one secure location to another. Mid-journey, he panicks -- his wireless device (laptop, iPad, or other common consumer electronics) is turned on! If it sent any information to an enemy-controlled access point, the enemy could…
spraff
- 305
- 2
- 9
3
votes
0 answers
How to change system fonts list in Firefox to avoid browser fingerprinting?
I found solution for most of types of browser fingerprints:
IP - ZenMate Firefox VPN Add-on
Canvas - CanvasBlocker Add-on
Timezone - I use AutoIt to change Windows Timezone
List of PlugIns - I just disable them all
HTTP Headers - Random Agent…
Paulo Cesar
- 47
- 1
- 2