mirror of
https://git.sr.ht/~seirdy/seirdy.one
synced 2024-11-27 14:12:09 +00:00
Compare commits
2 commits
f77399a117
...
a113963de4
Author | SHA1 | Date | |
---|---|---|---|
|
a113963de4 | ||
|
988dd888a0 |
2 changed files with 4 additions and 4 deletions
|
@ -25,7 +25,7 @@ Let’s get started:
|
||||||
|
|
||||||
TR is suitable for casual threat models. These techniques typically aim to remove trackers or to block malicious traffic.
|
TR is suitable for casual threat models. These techniques typically aim to remove trackers or to block malicious traffic.
|
||||||
|
|
||||||
If someone just wants to browse the web with less tracking, they’re probably not expecting a “nuclear option” that removes all their personalization. That user is more likely to concerned with manipulation by personalized ads, or something vague such as being “followed around” as they browse websites while signed out.
|
If someone just wants to browse the web with less tracking, they’re probably not expecting a “nuclear option” that removes all their personalization. That user is more likely to be concerned with manipulation by personalized ads, or something vague such as being “followed around” as they browse websites while signed out.
|
||||||
|
|
||||||
These users are likely okay with being identified by a site; several of their accounts are probably linked to the same identity. However, when they log into “example.com”, they’d rather not ping trackers from “facebook.com” or “amazon-adsystem.com”.
|
These users are likely okay with being identified by a site; several of their accounts are probably linked to the same identity. However, when they log into “example.com”, they’d rather not ping trackers from “facebook.com” or “amazon-adsystem.com”.
|
||||||
|
|
||||||
|
@ -132,7 +132,7 @@ The most common amnesiac technique is clearing cookies. A more thorough techniqu
|
||||||
|
|
||||||
=> https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables
|
=> https://www.whonix.org/wiki/Qubes/Disposables Qubes Disposables
|
||||||
|
|
||||||
The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful the TR/TE framework’s limitations.
|
The list goes on. “TR versus TE” is an important perspective to have, but it isn’t the only lens through which we should view privacy-enhancing techniques. Let’s be mindful of the TR/TE framework’s limitations.
|
||||||
|
|
||||||
## How to make privacy recommendations
|
## How to make privacy recommendations
|
||||||
|
|
||||||
|
|
|
@ -46,7 +46,7 @@ Tracking reduction (TR)
|
||||||
|
|
||||||
<abbr title="Tracking Reduction">TR</abbr> is suitable for casual threat models. These techniques typically aim to remove trackers or to block malicious traffic.
|
<abbr title="Tracking Reduction">TR</abbr> is suitable for casual threat models. These techniques typically aim to remove trackers or to block malicious traffic.
|
||||||
|
|
||||||
If someone just wants to browse the web with less tracking, they're probably not expecting a "nuclear option" that removes all their personalization. That user is more likely to concerned with manipulation by personalized ads, or something vague such as being "followed around" as they browse websites while signed out.
|
If someone just wants to browse the web with less tracking, they're probably not expecting a "nuclear option" that removes all their personalization. That user is more likely to be concerned with manipulation by personalized ads, or something vague such as being "followed around" as they browse websites while signed out.
|
||||||
|
|
||||||
These users are likely okay with being identified by a site; several of their accounts are probably linked to the same identity. However, when they log into "example.com", they'd rather not ping trackers from "facebook.com" or "amazon-adsystem.com".
|
These users are likely okay with being identified by a site; several of their accounts are probably linked to the same identity. However, when they log into "example.com", they'd rather not ping trackers from "facebook.com" or "amazon-adsystem.com".
|
||||||
|
|
||||||
|
@ -201,7 +201,7 @@ Goodness enumeration
|
||||||
Amnesia
|
Amnesia
|
||||||
: The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses.
|
: The most common amnesiac technique is clearing cookies. A more thorough technique is [using a disposable VM](https://www.whonix.org/wiki/Qubes/Disposables) that's erased and re-created between sessions. Rather than reduce or evade tracking, these measures reduce the persistence of trackers (and/or malware) that slip through other defenses.
|
||||||
|
|
||||||
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful the TR/TE framework's limitations.
|
The list goes on. "TR versus TE" is an important perspective to have, but it isn't the only lens through which we should view privacy-enhancing techniques. Let's be mindful of the TR/TE framework's limitations.
|
||||||
|
|
||||||
How to make privacy recommen­dations {#how-to-make-privacy-recommendataions}
|
How to make privacy recommen­dations {#how-to-make-privacy-recommendataions}
|
||||||
----------------------------------------
|
----------------------------------------
|
||||||
|
|
Loading…
Reference in a new issue