mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-23 21:02:09 +00:00
Typo
thanks mfwmyfacewhen
This commit is contained in:
parent
d810439d10
commit
f77399a117
2 changed files with 2 additions and 2 deletions
|
@ -58,7 +58,7 @@ Safe yet limited approaches to content filtering should lay a foundation, topped
|
|||
|
||||
## Tracking evasion (TE)
|
||||
|
||||
TE prevents an adversary from collecting meaningful information tied to one’s identity. Unlike “opting-out” and blocking known well-known third-party trackers, tracking evasion distrusts all parties by default. This approach assumes that tracking is equally likely to happen through both first-party and third-party trackers.
|
||||
TE prevents an adversary from collecting meaningful information tied to one’s identity. Unlike “opting-out” and blocking well-known third-party trackers, tracking evasion distrusts all parties by default. This approach assumes that tracking is equally likely to happen through both first-party and third-party trackers.
|
||||
|
||||
Therefore, a list of known third-party trackers is irrelevant to tracking evasion. Users following this approach in its purest form *treat every party capable of tracking as a hostile tracker*.
|
||||
|
||||
|
|
|
@ -77,7 +77,7 @@ I covered this topic a bit more in {{<mention-work itemtype="BlogPosting">}}{{<c
|
|||
Tracking evasion (TE)
|
||||
---------------------
|
||||
|
||||
<abbr title="Tracking Evasion">TE</abbr> prevents an adversary from collecting meaningful information tied to one's identity. Unlike "opting-out" and blocking known well-known third-party trackers, tracking evasion _distrusts all parties by default._ This approach assumes that tracking is equally likely to happen through both first-party and third-party trackers.
|
||||
<abbr title="Tracking Evasion">TE</abbr> prevents an adversary from collecting meaningful information tied to one's identity. Unlike "opting-out" and blocking well-known third-party trackers, tracking evasion _distrusts all parties by default._ This approach assumes that tracking is equally likely to happen through both first-party and third-party trackers.
|
||||
|
||||
Therefore, a list of known third-party trackers is irrelevant to tracking evasion. Users following this approach in its purest form _treat every party capable of tracking as a hostile tracker._
|
||||
|
||||
|
|
Loading…
Reference in a new issue