Just because you’re paranoid doesn’t mean you’re not being watched.
When you’re on the Internet, there are good reasons to have that eerie sense of being followed.
By now, most of us know that websites can gather a surprising amount of information about your computer. For example, the page request you send to a site’s server includes detailed information about your browser — not just which browser you’re using, but the exact version, its configuration, and even the screen resolution the browser is running in. Other gathered data includes the page you came from, what document you’re requesting, and — yes, your IP address.
And don’t think you have anonymity just because your service provider gives you a dynamic IP address. At a minimum, visited websites can tell what service provider you’re with and what city or region you are in.
What’s more, any communication with a Web server gives it the opportunity to deposit a cookie on your computer. Benign cookies — small text files downloaded through your browser — simply record information needed to make your Web experience better. That can include sign-in information, where you visited on the site, interface customizations, and the like. Most cookies also keep an identifier for each visitor, so that the next time you connect to a site’s server, it can match you up with its records of previous visits. That way, you won’t have to start from scratch whenever you go to the site.
Less benign cookies can let websites track your movements around the Internet, and they often collect more information than you really want to give.
Typically, the information gleaned by trackers doesn’t include your name and street address. But by putting together all the collected data from page requests and cookies, Web servers can effectively fingerprint individual computers and thus track users across the Internet.
What many users don’t know is the extent of the information now collected. If a webpage contains an advertisement, your browser will often send a request to a third-party ad server to download the advertisement. In addition to telling the ad server what site you’re visiting, the request contains yet another identifier — still not your name, but a number that corresponds to your computer.
And that ad server might deposit its own cookie on your computer.
So far, all this tracking hasn’t identified you by name and address. But online tracking companies will have a considerable amount of information — including, again, your computer’s IP address — about your online activities. On some sites, the result is targeted ads, tailored content, and possibly a Web experience that’s customized specifically for you (or, more precisely, customized for the activity on a specific computer).
For example, one day I searched for “line trimmers” on Google. The next day, I went to the Home Depot site. What was the first thing I saw? An ad for line trimmers — and it was no coincidence. Some users will be happy with that result; others will not. Let a friend or family member browse the Web with your computer, and ads for products you have absolutely no interest in might follow you around the Internet for days or weeks.
Good intelligence analysts might be able to figure out who’s behind a computer by analyzing online activities, but for most users, the real danger comes from joining social-networking sites such as Facebook or Google+. By their nature, social sites encourage you to feed them lots of personal information — including your name and address. The social site, and any organizations with which it shares data, can connect the dots back to a specific individual — as opposed to a specific computer. (And we can assume government agencies are doing the same.)
And you know all those social widgets you find on visited sites? Page requests are sent to those servers as well. If you’ve logged into Facebook in the past month, for example, and you haven’t specifically signed out, the widget can track your presence across all sites that also have the widget. If you want to see how visited websites communicate directly with each other, download the Collusion (see Figure 1) add-on for Firefox and Chrome.
Figure 1. Collusion graphically shows the connections between sites you visit.
Browsers offer limited tracking controls
So what can you do to manage or reduce tracking? In this article, we’ll start by looking at the built-in controls available in the three most popular browsers. Unfortunately, though these user-configurable tools provide some protection, you can’t rely on them to fully protect your online identity.
In a following article, I’ll go into third-party add-ons and utilities that provide better protection.
The privacy tools in the major browsers focus primarily on cookie management. To understand how the tools work, it’s important to understand the various types of cookies. Here’s the short explanation:
Session cookie: When the cookie doesn’t carry an expiration date, it’s usually a session cookie — one that will be deleted when the browser is closed.
Persistent cookie: Also called a tracking cookie, the persistent cookie will remain on the computer until it reaches its expiration date. These cookies can be accessed by their creators whenever you connect to the creators’ Web servers.
Secure cookie: If the cookie is set with an HTTPS attribute, it’s sent from the Web server in an encrypted form to prevent cookie theft.
HTTPOnly cookie: Such cookies can be transmitted only through HTTP or HTTPS requests, which also helps protect them from being stolen.
Third-party cookie: These cookies come from a source other than the site you’re visiting. Webpage ads, for example, typically deliver their own, third-party cookies.
Supercookie: Tracking technologies that typically do not use HTTP, supercookies are often created by applications, such as Adobe Flash and Microsoft Silverlight, that you might have installed on your computer. These cookies can store up to 10MB of data, whereas an HTML cookie is limited to 4K. Supercookies can also track user behavior across multiple sites.
Zombie cookie: These cookies are automatically re-created after a user has deleted them. This is done by a script that gets the data from a supercookie. For more on zombie cookies, see Woody Leonhard’s Aug. 5, 2010, Top Story, “Eliminate Flash-spawned ‘zombie’ cookies.”
All major browsers give basic controls over the allowed types and duration of downloaded cookies. Some browsers provide additional controls — and they differ in how easy it is to access, understand, and configure these controls. Here’s what you get with the leading browsers:
Firefox: To its credit, Firefox has made it simple for users to access and navigate the browser’s privacy-related tools. All tools and settings — with one exception we’ll deal with below — can be accessed by clicking the Tools menu, then Options, and the Privacy tab.
Firefox can be set to automatically send a Do Not Track notification to websites that support the technology. Once that’s set, every website visited will receive a request in the page header that you not be tracked. But let’s be clear: this is just a request. Firefox isn’t actively preventing tracking; it’s up to each website to honor the request. But it can’t hurt to ask. To do so, just click the radio button next to “Tell sites that I do not want to be tracked” (circled in yellow in Figure 2).
Figure 2. Firefox does the best job of gathering its privacy tools into one easy-to-access location.
Next, you’ll want to adjust your history settings. By default, Firefox accepts all cookies and remembers your browsing history, downloads, and search history. To change that behavior, click on the History/Firefox will: button and select either Never remember history or Use custom settings for history (see Figure 2). You can easily switch between these settings, depending on the sites you plan to visit.
Selecting the custom settings brings up a layered array of controls. I opted to disable my browsing and download history while retaining my search and form history. Then, it was on to cookies. A drop-down list gives you two choices: always accepting third-party cookies or never accepting them. I chose to never accept them, but had I accepted them, I could have stipulated that Firefox delete them when they expire or when I close the browser — or to prompt me each time I close.
The Exceptions button lets me specify sites that will be exempted from the set policy. Try this option for important sites that have lost functionality.
Finally, you can check a box that automatically clears your browsing history whenever Firefox closes.
I had to search for the setting that would disable local-domain (DOM) storage so that supercookies could not use it. As it turns out, this technique — suitable primarily for advanced users — requires manual editing of Firefox’s configuration table. To do so, type “about:config” in the URL bar and hit Enter. A long list of browser configuration settings appears. Scroll down until you find DOM.storage.enable. Right-click on the listing and then click Toggle. Close the browser Window and you’re in business.
Figure 3. To disable local-domain storage, you'll have to call up Firefox's somewhat-hidden configuration page.
Firefox is the only one of the three browsers that lets you set private browsing as the default. While Private Browsing (more info) is on, Firefox doesn’t save a history of visited pages, search-bar entries, passwords, cookies, etc.
That doesn’t mean, however, that websites can’t collect information about your PC during a Private Browsing session. Also, some websites might not have their full functionality when you have private browsing on.
To block beacons, scripts, and other forms of online tracking agents in Firefox, you’ll need to download and install add-ons. Fortunately, they are free and easy to install, as I’ll discuss in Part 2 of this series.
Google Chrome: This browser is the least intuitive of the three browsers when it comes to finding and configuring privacy settings. All Chrome settings are configured on webpages (see Figure 4) that are not especially well designed for ease of use. Moreover, users have to go through several layers to find many of the tools.
Figure 4. Google Chrome uses standard webpages for its many settings. Note that Privacy is well down the fully expanded Settings page.
Now click the Content settings button; you’ll finally find the options for managing cookies (see Figure 5).
Figure 5. Chrome doesn't make it easy to find its cookies settings, and the options are relatively basic.
Chrome gives you four choices for controlling cookies: allow or disallow all cookies, allow cookies to be kept just during your current session, or allow only specific third-party cookies.
Chrome also lets you show all images on sites — or none. Although it’s not explained, blocking images is a way of blocking Web beacons. Again, if you want to be more discriminating about what images are blocked, you’ll need to download a Chrome extension — a step I recommend.
Finally, like other browsers, Chrome supports Do Not Track requests.
The tools for clearing existing cookies and other tracking information are located on another page. Click on the three-bar icon again and select Tools/Clear browsing data. You’ll then be able to select the specific types of stored data you want to clear. Although it’s not well explained, selecting Delete cookies and other site and plug-in data will remove Flash cookies. (Nothing is mentioned about other types of supercookies.)
Figure 6. Chrome's tools for deleting browsing data are simple to use — though not especially informative.
In Chrome, unfortunately, there’s no way to prevent supercookies from using local storage — unless you prevent all cookies from using local storage.
Chrome includes Incognito mode (more info) for private browsing. It works much like Firefox’s Private Browsing, but cannot be set as the default.
Although Chrome provides many of the same basic privacy controls found in competing browsers, we can forgive users who get the impression that Google really doesn’t want us to use Chrome’s privacy controls. After all, Google is one of largest collectors of online-behavior data.
Internet Explorer 10: Microsoft’s browser has a relatively strong set of privacy tools, though it would be better if they were in one place. As it is, you’re forced to work through several menus to configure all privacy settings.
Starting with cookie management, click IE’s gear icon in the browser’s upper-right corner and select Internet options; then select the Privacy tab. A slider offers six levels of protection, ranging from blocking all cookies to allowing all cookies (see Figure 7).
Figure 7. IE's Privacy tab lets you quickly select from six cookie policies — or set a custom policy.
To create a custom policy, click the Advanced tab; you’ll then be able to specify whether first- and third-party cookies should be blocked or allowed, or whether you should be prompted for acceptance. In addition, you can allow or disallow session cookies.
Bear in mind, however, that these settings apply only to HTML cookies and do not impact supercookies, which are managed by other applications. And even though IE 10 doesn’t delete all supercookies when you delete your browsing history, if you have Flash 10.3 or later loaded, IE will at least delete Flash cookies.
To clear your browsing history, simply click the Tools menu (not the gear icon) and select Delete browsing history. IE will then display a list of delete/preserve options, including temporary Internet files, cookies, your list of visited sites, download histories, etc. (See Figure 8.)
Figure 8. The Delete Browsing History tool makes it simple to select just what you want to delete from your browser history.
You can also set how long IE 10 retains its history of online activities. To do so, return to Internet options and select the General tab. In the Browsing history section, click Settings and choose the History tab. Then simply set the number of days. Alternatively, you can simply check the Delete browsing history on exit box back in the Browsing History section.
Next, turn on IE 10′s Do Not Track option. In Internet options, click the Advanced tab and scroll down to the checkbox, Always send Do Not Track header.
Figure 9. You'll have to dig a bit to have IE send Do Not Track headers, but it's worth doing.
You can expect better results, however, by activating IE 10′s Tracking Protection. Click Tools/Tracking Protection, and the browser’s add-on manager will open with Tracking Protection highlighted. When I did so, I found a single, disabled entry labeled “Your Personalized List.” I highlighted that item and clicked the Enable button down in the lower-right corner of the Manage Add-ons window.
Next, I deselected “Your Personalized List by clicking a blank area just below it, which popped up a new link, Get a Tracking Protection List online. Clicking the link took me to Microsoft’s Internet Explorer Gallery, where I was offered a choice of additional, much more extensive, third-party lists. Clicking the Add button for Abine Standard added this list to Tracking Protection (see Figure 10).
Figure 10. IE's Tracking Protection feature offers a quick way to download and integrate third-party tracking protection lists.
Once you’ve enabled tracking protection lists, IE 10 will block all data from going out to those sites.
You can also add some Internet protection with IE 10′s InPrivate Browsing, found in the Tools menu, which works in much the say way as Chrome’s Incognito mode. As with Chrome, InPrivate Browsing can’t be set as the default — you have to enable it for each browsing window.
There are two other controls in Internet Options you might want to use. Click the Privacy tab and check the Never allow websites to request your physical location box. Or click the Advanced tab and uncheck the Enable DOM storage box to prevent supercookies from using local storage.
Beyond cookies: Additional privacy controls
Even though all three browsers offer basic controls over cookies, you’ll need to do more and use additional tools if you want to avoid being tracked on the Internet. Perhaps reconsider your membership in social networks. Or at least review the privacy settings you use on those sites and the information you post.
To beef up your browser, you’ll want to install add-ons that detect and block Web beacons and other data collectors. I’ll be looking at several of the major add-ons in Part 2 of this series.