Questions tagged [tracking]

126 questions
6
votes
2 answers

Can government track VPN traffic if it has control on both ISP and website server?

Let's say I access a website called example.com with VPN. Here's the flow: me → ISP → VPN → example.com Do typical VPN providers use the same IP address to receive data from ISP and send data to the destination server (example.com)? If that is the…
Max
  • 175
  • 2
  • 5
6
votes
0 answers

How does Facebook Pixel's new first-party cookie work?

Facebook recently announced that they will begin offering a first-party cookie option for the Facebook Pixel. Previously, they only used third-party cookies. From their documentation: You can now use both first and third-party cookies with your…
Flimm
  • 1,230
  • 3
  • 13
  • 22
6
votes
2 answers

Why do browsers expose installed fonts?

It's a well known fact (in the privacy-aware community, at least), that a factor quite used for tracking is the list of installed fonts, which browsers seem to expose, and trackers exploit this. There's lots of questions and answers as to how to…
WhyNotHugo
  • 208
  • 1
  • 9
6
votes
0 answers

Can I use disk encryption and track my device at the same time, in case it's stolen or lost?

I would like to encrypt a single user profile but have been told EFS isn't the solution. I have a laptop that I leave in my bag and use for work and private purposes. I want to secure data in case my laptop is stolen or lost, and also I would like a…
5
votes
1 answer

Untraceable software development

My goal is to develop a piece of software which is illegal in my country. Obviously I don't want anyone to be able to trace the code back to me or prove that I developed it after deployment. What precautions would be needed? Which pitfalls need to…
5
votes
2 answers

How does the Random Hardware Access function work on a smartphone?

Certain smartphones and laptops, one of which my Windows 10 Phone and Laptop (Windows 10, redstone 1 update) have a function called "Random Hardware Access" under the WiFi settings. The settings has the following explanation for this function: Use…
Lighty
  • 2,368
  • 1
  • 23
  • 36
5
votes
6 answers

If a hacker were to obtain a shipping tracking number what could be compromised?

Lets assume you just bought something and it is getting shipped via a major package shipping agency (such as FedEx or UPS etc.). You are given a tracking number which you can use to view where the package is. Now somehow a hacker is able to obtain…
Eric Johnson
  • 715
  • 1
  • 6
  • 11
5
votes
2 answers

Is it possible to identify the source of message in whatsapp?

Is it possible to identify the real source of message in whatsapp? Scenario : Texting whatsapp message to a group,one of the group member forwards it to another and it goes on atlast one day it reaches me again. Questions : Now as a end user, I can…
BlueBerry - Vignesh4303
  • 5,107
  • 13
  • 34
  • 63
5
votes
1 answer

Does the use of JavaScript make ProtonMail insecure?

I like the look of ProtonMail. However, what has stopped me from signing up is that JavaScript seems to be used at various points in the site, and for someone to read your email they must click on a link to what I believe is a JavaScript page? For…
k1308517
  • 1,272
  • 14
  • 27
5
votes
1 answer

Third-Party-Cookies Tracking - Google Chrome

I've read an article about third-party-cookies which explained that in Google Chrome disabling third-party-cookies will not stop the browser from sending third-party-cookies. So when I visit Facebook every day and get first-party-cookies from them,…
maxeh
  • 346
  • 3
  • 15
4
votes
1 answer

Is Verizon Still Injecting Perma-Cookies into Customer Traffic?

This article was published in 2014. Is Verizon still doing this to customer data? It makes sense to assume they are, but I'm hoping for some kind of official news article or something to validate its continued existence.
user194659
  • 41
  • 1
3
votes
3 answers

Is it possible to track someone by sharing a youtube link with timestamp?

Is it possible to track someone by sharing a youtube link with them with a timestamp such as &t=1s if they click on it on their end? I've recently have been told not to use timestamps because of this...
3
votes
2 answers

My company sent a phishing email - can they see if I saved the attachment?

My company is doing an anti-phishing campaign and sent out a "fake" email to see how many people would open the attachment. They had previously sent out information about how to avoid these kind of attacks. So of course I recognized the email as…
glassy
  • 131
  • 1
3
votes
1 answer

What information can WiFi devices leak without actually connecting?

Mr Paranoid walks from one secure location to another. Mid-journey, he panicks -- his wireless device (laptop, iPad, or other common consumer electronics) is turned on! If it sent any information to an enemy-controlled access point, the enemy could…
spraff
  • 305
  • 2
  • 9
3
votes
0 answers

How to change system fonts list in Firefox to avoid browser fingerprinting?

I found solution for most of types of browser fingerprints: IP - ZenMate Firefox VPN Add-on Canvas - CanvasBlocker Add-on Timezone - I use AutoIt to change Windows Timezone List of PlugIns - I just disable them all HTTP Headers - Random Agent…
1
2
3
8 9