diff --git a/_includes/downloads.html b/_includes/downloads.html index 9184fabe..8149c55a 100644 --- a/_includes/downloads.html +++ b/_includes/downloads.html @@ -2,14 +2,14 @@
Privacy Guides is a socially motivated website that provides information for protecting your data security and privacy.
diff --git a/_includes/head.html b/_includes/head.html index d54abce6..9f78819a 100644 --- a/_includes/head.html +++ b/_includes/head.html @@ -35,5 +35,6 @@ - + + diff --git a/_includes/hr.html b/_includes/hr.html new file mode 100644 index 00000000..7198ab1e --- /dev/null +++ b/_includes/hr.html @@ -0,0 +1 @@ +When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
- - - -You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
- -Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins to regain control. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
- -While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. Note: This disables browser-based call functionality that is used for webapps like Discord, Hangouts, Jitsi, etc.
- - - -In short: Set "media.peerconnection.enabled" to "false" in "about:config".
-Explained:
- -If you want to make sure every single WebRTC-related setting is really disabled change these settings:
- -Now you can be 100% sure WebRTC is disabled.
- - - -Safari is far stricter with WebRTC than other major browsers, and it does not leak your IP address in its default configuration. If you'd like, you can follow these steps just to double-check your browser:
- -WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
- -Chrome on macOS and Internet Explorer do not implement WebRTC yet. But we recommend using Firefox on all devices.
diff --git a/_includes/recommendation-card.html b/_includes/recommendation-card.html index ba0e04f2..acab8555 100644 --- a/_includes/recommendation-card.html +++ b/_includes/recommendation-card.html @@ -10,12 +10,12 @@ {% if post.warning %}{{ post.warning }}
{% endif %} {{ post.short | markdownify }}- {% if post.platform_win %}{% endif %} - {% if post.platform_mac %}{% endif %} - {% if post.platform_linux %}{% endif %} - {% if post.platform_android %}{% endif %} - {% if post.platform_ios %}{% endif %} - {% if post.website %}{% endif %} + {% if post.platform_win %}{% endif %} + {% if post.platform_mac %}{% endif %} + {% if post.platform_linux %}{% endif %} + {% if post.platform_android %}{% endif %} + {% if post.platform_ios %}{% endif %} + {% if post.website %}{% endif %}
When you visit a web page, your browser voluntarily sends information about its configuration, such as available fonts, browser type, and add-ons. If this combination of information is unique, it may be possible to identify and track you without using cookies. EFF created a Tool called Panopticlick to test your browser to see how unique it is.
+ + + +You need to find what most browsers are reporting, and then use those variables to bring your browser in the same population. This means having the same fonts, plugins, and extensions installed as the large installed base. You should have a spoofed user-agent string to match what the large userbase has. You need to have the same settings enabled and disabled, such as DNT and WebGL. You need your browser to look as common as everyone else. Disabling JavaScript, using Linux, or even using the Tor Browser Bundle, will make your browser stick out from the masses.
+ +Modern web browsers have not been architected to assure personal web privacy. Rather than worrying about being fingerprinted, it seems more practical to use free software plugins to regain control. They not only respect your freedom, but your privacy also. You can get much further with these than trying to manipulate your browser's fingerprint.
+ +While software like NoScript prevents this, it's probably a good idea to block this protocol directly as well, just to be safe. Note: This disables browser-based call functionality that is used for webapps like Discord, Hangouts, Jitsi, etc.
+ + + +In short: Set "media.peerconnection.enabled" to "false" in "about:config".
+Explained:
+ +If you want to make sure every single WebRTC-related setting is really disabled change these settings:
+ +Now you can be 100% sure WebRTC is disabled.
+ + + +Safari is far stricter with WebRTC than other major browsers, and it does not leak your IP address in its default configuration. If you'd like, you can follow these steps just to double-check your browser:
+ +WebRTC cannot be fully disabled in Chrome; however, it is possible to change its routing settings (and prevent leaks) using an extension. Two open-source solutions include WebRTC Leak Prevent (options may need to be changed depending on the scenario), and uBlock Origin (select "Prevent WebRTC from leaking local IP addresses" in Settings).
+ +Chrome on macOS and Internet Explorer do not implement WebRTC yet. But we recommend using Firefox on all devices.
+ +{% include hr.html %} + +{% include legacy/sections/browser-addons.html %} + +{% include legacy/sections/browser-tweaks.html %} diff --git a/privacytools.io/404.html b/privacytools.io/404.html deleted file mode 100644 index 6e8e7276..00000000 --- a/privacytools.io/404.html +++ /dev/null @@ -1,23 +0,0 @@ ---- -layout: minimal -active_page: 404 ---- - -We couldn't find that :(
-Maybe you were looking for one of these pages?
-If you believe you reached this page in error, please contact us!
-