Steve Smith talks about Do Not Track headers, and the many issues and problems with this latest header request.
Released: July 13, 2013
The Do Not Track header, is a new way of telling web-sites, you do not wish to be tracked, intended for third party advertisers who use a multitude of databases of collected information on you and your browsing patterns to target you with advertisements that fit your relative profile.
While these advertisements are actually, for the most part, related to your points of interest, it can be creepy and unsettling for anyone to be the target of any such personalized advertisements. It may, also, feel like your right to privacy is being ignored when companies track, record, and sell your personal information for profit, in which you do not share a gain.
It is for this reason that the Do Not Track header was created, and with much criticism and ignorance. For this reason, we have decided to enlighten people to the truth of Do Not Track.
The Do Not Tracker header is only a variable, represented by either a 0 or a 1. Do Not Track is considered on, when the header is represented with a 1.
Do Not Track is not legally binding or enforceable. As this remains a variable, there is no way to confirm usage and awareness, without viewing the code available, and most programs are considered secret and / or copyrighted. And, in order, to force a company to show code they do wish not to publish, you will have to demand the right to see it with an appeal to the courts for the information or programmed code. Good luck there.
The Do Not Track header is not ON by default. In fact, if ever a browser were to turn it on by default, the advertisement companies would simply ignore that series of browsers, even those who wish for this setting to be on.
The Do Not Tracker header is no where near as effective as blocking all cookies, using anonymizers, using a different IP address through a VPN, and changing or nulling all headers coming from your browser. In fact, even with cookies completely blocked, browser fingerprinting can be used to identify your computer.
Do Not Track, being a variable, is probably not programmed into every web-site yet, and for this, even when turned on, web-sites can be ignorant or unaware of that header, as it neither looks for it, or know what to do with that variable.
Now, with that pointed out, here are three questions and answers to help all of you with Do Not Track headers and tracking, in general.
When I block third party cookies, does it block all other web-sites other than the one I am on?
Should I turn on Do Not Track?
Yes, even if very few web-sites are aware of this variable, and the functionality is limited to either a 0 or a 1, there may be a time when all or most legitimate web-sites will respect this header request. If this widely available header request is not used, it may ultimately be ignored, and forgotten, as well.
How do I become completely anonymous online?
This is complicated, and very much impossible. It would require you to change your IP address, route your traffic through one or more VPNs, block all cookies, and nullify all request and browser headers from your computer to also prevent browser fingerprinting. This may ultimately be a waste of your time, if you login anywhere, since you will be acknowledging who you are.
Next week, I will be talking about and demonstrating how to do an image search.
Remember to like this episode if you were interested in today's topic, share if you think someone else could benefit from the topic, and subscribe if you want to learn more. For the show notes of this episode and others, for more information on other ways to subscribe to our show, to subscribe to our weekly newsletter, and how to participate by submitting your questions, comments, suggestions, and stories, head over to TQAWeekly.com.
Host : Steve Smith | Music : Jonny Lee Hart | Editor : Steve Smith | Producer : Zed Axis Productions
You may have noticed in the recent days that a vulnerability called Heartbleed has hit the internet and has affected a large number of web-sites.
It should remove all traces of the virus, provided the hard drive has no bad sectors on it. It it does, you the mentioned Spinrite to try to fix the hard drive then run DBAN after, but usually, DBAN can erase the entire drive without issue. I've used it on maximum and let it run almost 16 hours on my friends computer, that is why this episode exists.
Great! I am going to run 'autonuke' on a machine that has polymorphic malware, not sure if it is in the MBR or somewhere else on the machine. Assuming autonuke runs fully without any error, will it remove the malware from the computer with certainty?
Yes, it will wipe all data, including the master boot record on your hard drive. If you are unable to get DBAN to work correctly, consider using Spinrite to fix the drive so DBAN can work, rarely needed, good to have.
Running DBAN and using 'autonuke', will that also completely wipe the Master Boot Record (MBR)?