Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

Disc space -- the final frontier!


computers / alt.comp.software.firefox / Privacy / Cookie / Script etc add-ons

SubjectAuthor
* Privacy / Cookie / Script etc add-onsBig Al
+- Re: Privacy / Cookie / Script etc add-onsRetirednoguilt
+- Re: Privacy / Cookie / Script etc add-onsJohnny
+- Re: Privacy / Cookie / Script etc add-onsR.Wieser
+* Re: Privacy / Cookie / Script etc add-onsNewyana2
|`* Re: Privacy / Cookie / Script etc add-onsBig Al
| `- Re: Privacy / Cookie / Script etc add-onsNewyana2
+- Re: Privacy / Cookie / Script etc add-onsJoerg Lorenz
+- Re: Privacy / Cookie / Script etc add-onsNormal Killer
`* Re: Privacy / Cookie / Script etc add-onsComputer Nerd Kev
 `* Re: Privacy / Cookie / Script etc add-onscandycanearter07
  `* Re: Privacy / Cookie / Script etc add-onsComputer Nerd Kev
   `* Re: Privacy / Cookie / Script etc add-onsNewyana2
    +* Re: Privacy / Cookie / Script etc add-onsJohnny
    |+- Re: Privacy / Cookie / Script etc add-onsJoerg Lorenz
    |`* Re: Privacy / Cookie / Script etc add-onsNewyana2
    | `- Re: Privacy / Cookie / Script etc add-onsJörg Lorenz
    +- Re: Privacy / Cookie / Script etc add-onsJoerg Lorenz
    +- Re: Privacy / Cookie / Script etc add-onsNFN Smith
    `- Re: Privacy / Cookie / Script etc add-onsComputer Nerd Kev

1
Privacy / Cookie / Script etc add-ons

<ut99a6$56cd$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3181&group=alt.comp.software.firefox#3181

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: alan@invalid.com (Big Al)
Newsgroups: alt.comp.software.firefox
Subject: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 07:41:58 -0400
Organization: A noiseless patient Spider
Lines: 13
Message-ID: <ut99a6$56cd$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 18 Mar 2024 11:41:58 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="e3e89c8122de051e0f8732315e80bc46";
logging-data="170381"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX184I0C/re/tpNn6YzjLP7ngqBdLq3Q2Jaw="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:hHOF2fVClrO+ypWOkXnMIGIZA88=
Content-Language: en-US
 by: Big Al - Mon, 18 Mar 2024 11:41 UTC

Starting a new thread here, but the subject came up of the places.sqlite file and visiting sites
that loaded other sites etc etc etc.

The conversation hit upon plugins/addons that stopped this. I'm sure a good number of you try to
stop the intrusions into your browser, so my question is, what tweaks/add-ons/plugins do you use to
do this?
Specifically the name and why so others might load the add-on too.
I'm more curious than paranoid but I might just learn something. Hell, Ublock Origin was unknown
till I was told about it.

--
Linux Mint 21.3 Cinnamon 6.0.4
Al

Re: Privacy / Cookie / Script etc add-ons

<ut9a1u$5cho$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3182&group=alt.comp.software.firefox#3182

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: HapilyRetired@fakeaddress.com (Retirednoguilt)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 07:54:37 -0400
Organization: A noiseless patient Spider
Lines: 19
Message-ID: <ut9a1u$5cho$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me>
Reply-To: HapilyRetired@fakeaddress.com
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 18 Mar 2024 11:54:38 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="18fa4e6ffe234ce6e713a23f0b4b9398";
logging-data="176696"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18WXn0MyPfR0lUriv5149C5fbe9RFMnVKM="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:fUFm0e5GaqZlIBKph9Hz7NrEG44=
In-Reply-To: <ut99a6$56cd$1@dont-email.me>
Content-Language: en-US
 by: Retirednoguilt - Mon, 18 Mar 2024 11:54 UTC

On 3/18/2024 7:41 AM, Big Al wrote:
> Starting a new thread here, but the subject came up of the places.sqlite file and visiting sites
> that loaded other sites etc etc etc.
>
> The conversation hit upon plugins/addons that stopped this. I'm sure a good number of you try to
> stop the intrusions into your browser, so my question is, what tweaks/add-ons/plugins do you use to
> do this?
> Specifically the name and why so others might load the add-on too.
> I'm more curious than paranoid but I might just learn something. Hell, Ublock Origin was unknown
> till I was told about it.
>

I use Privacy Badger and DuckDuckGo Privacy Essentials. Depending upon
which web site I'm on and what I'm trying to do, I sometimes have to
turn off Privacy Badger for a specific site or web page to get a page to
work properly. However, it's surprising to see how often many sites or
cookies are blocked without affecting the utility of some web sites. In
almost all circumstances, government web sites aren't affected by those
2 add-ons.

Re: Privacy / Cookie / Script etc add-ons

<20240318065952.5e96e905@Johnny>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3183&group=alt.comp.software.firefox#3183

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: johnny@invalid.net (Johnny)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 06:59:52 -0500
Organization: A noiseless patient Spider
Lines: 18
Message-ID: <20240318065952.5e96e905@Johnny>
References: <ut99a6$56cd$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Info: dont-email.me; posting-host="09a64685e3d3d84f0e31ae49a0c4e1ff";
logging-data="148553"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18AAUZZlibdUkMC4RUwapyj"
Cancel-Lock: sha1:zjlGGrUYrUr9icHfMVc2E62bya4=
X-Newsreader: Claws Mail 4.1.1 (GTK 3.24.38; x86_64-pc-linux-gnu)
 by: Johnny - Mon, 18 Mar 2024 11:59 UTC

On Mon, 18 Mar 2024 07:41:58 -0400
Big Al <alan@invalid.com> wrote:

> Starting a new thread here, but the subject came up of the
> places.sqlite file and visiting sites that loaded other sites etc
> etc etc.
>
> The conversation hit upon plugins/addons that stopped this. I'm
> sure a good number of you try to stop the intrusions into your
> browser, so my question is, what tweaks/add-ons/plugins do you use
> to do this? Specifically the name and why so others might load the
> add-on too. I'm more curious than paranoid but I might just learn
> something. Hell, Ublock Origin was unknown till I was told about
> it.
>

https://noscript.net/

Re: Privacy / Cookie / Script etc add-ons

<ut9eci$6ctf$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3184&group=alt.comp.software.firefox#3184

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: address@is.invalid (R.Wieser)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 14:08:23 +0100
Organization: A noiseless patient Spider
Lines: 32
Message-ID: <ut9eci$6ctf$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me>
Injection-Date: Mon, 18 Mar 2024 13:08:35 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d13283e1ad46431e79f1e95cdd4c7332";
logging-data="209839"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18EteGnJ7/P/djh+xGKdhe8X72yGVuKqYTbDbONCBxhRw=="
Cancel-Lock: sha1:6GxTOCJP88H93BGuxlvEUeiYQas=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
X-RFC2646: Format=Flowed; Response
X-Newsreader: Microsoft Outlook Express 6.00.2900.5512
X-Priority: 3
X-MSMail-Priority: Normal
 by: R.Wieser - Mon, 18 Mar 2024 13:08 UTC

Al,

> ... the subject came up of the places.sqlite file and visiting sites that
> loaded other sites etc etc etc.

> what tweaks/add-ons/plugins do you use to do this?

I mentioned a setting to change the automatically following of redirections
into a manual one. I was mistaken. That behaviour - and the "only
first-party resources allowed" (configurable) I mentioned - is provided by
an extension named "RequestPolicy".

As others have mentioned, have a bit more control over which websites are
allowed to run scripts you could take a peek at the "NoScript" extension.

As I sometimes dislike how websites present themselves I've got an extension
with the name "GreaseMonkey" installed, which uses user-written JS to change
how the webpage looks. I also use it to remove "you've got an ad-blocker
installed, get rid of it" (which I have not) messages. :-)

Thats it for me. It seems to cover all my needs.

So, "RequestPolicy", "NoScript" and "GreaseMonkey".

A remark though : I'm still running FF v52 on XPsp3, and have no idea if
extensions still exists for a more recent version of FF (the extension
mechanism has changed quite a bit).

Regards,
Rudy Wieser

Re: Privacy / Cookie / Script etc add-ons

<ut9ib4$7780$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3186&group=alt.comp.software.firefox#3186

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Newyana2@invalid.nospam (Newyana2)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 10:15:57 -0400
Organization: A noiseless patient Spider
Lines: 72
Message-ID: <ut9ib4$7780$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me>
Injection-Date: Mon, 18 Mar 2024 14:16:04 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6b52fc33324991977d4b77d09e58c988";
logging-data="236800"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/u22mIw4MXPpKWsLSQ19V+N3iF/k5iLHQ="
Cancel-Lock: sha1:jb+GSySDNRpi/Yaeqaf4aJwk4AY=
X-MSMail-Priority: Normal
X-Priority: 3
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
X-Newsreader: Microsoft Outlook Express 6.00.2900.5512
 by: Newyana2 - Mon, 18 Mar 2024 14:15 UTC

"Big Al" <alan@invalid.com> wrote

| The conversation hit upon plugins/addons that stopped this. I'm sure a
good number of you try to
| stop the intrusions into your browser, so my question is, what
tweaks/add-ons/plugins do you use to
| do this?
| Specifically the name and why so others might load the add-on too.
| I'm more curious than paranoid but I might just learn something. Hell,
Ublock Origin was unknown
| till I was told about it.
|

This is a big topic. I use NoScript and a CSS toggler
in Firefox, to minimize script and make webpages more
flexible. For most of my purposes I can avoid enabling script.

In Firefox I also set FF Accessibility.blockautorefresh and
disable the various types of prefetching, which have become a
whole new aspect of online spying. If you look at the source
code of commercial pages these days you may see code in
the header, calling on the browser to invisibly load several
other webpages and make several DNS calls. For example,
yesterday I was trying to figure out how to shut off the idiotic
message at login that my password had expired in Win10.
I don't even have a password! I found a webpage with a good
explanation and downloaded the page to save. This was in
the header:
<link rel="dns-prefetch" href="//www.google-analytics.com" />
<link rel="dns-prefetch" href="//ajax.googleapis.com" />
<link rel="dns-prefetch" href="//www.googleadservices.com/" />
<link rel="dns-prefetch" href="//www.googletagmanager.com/" />
<link rel="dns-prefetch" href="//c.disquscdn.com/" /> That's just DNS
prefetching. Some pages tell the browser
to prefetch whole webpages. But even DNS, if people are
using something like Google or their ISP, is a potential tracking
source.

For most of my browsing I'm also still using an outdated
extension called Secret Agent that messes with such obscure
items as etags.

I close the browser when not using it, only use Firefox
or *Moon browsers, and set cookies to delete when the
browser closes. I also disable "supercookie" cache and set
webpage cache to 10 MB limit. Web cache is all but outdated
today. 304 server responses are rare. And web cache is used
in tracking, by doing things like using script to see whether links
in the page are visited color after you load it.

I've always used a HOSTS file and now use Acrylic DNS proxy
with its own wildcard HOSTS file, which can block things
like *.googletagmanager.com.

For friends I set up UBlock Origin and possibly a limited Acrylic
HOSTS file. That's for people who won't do anything themselves
and can't handle NoScript. UO is better than nothing. But it's
not clear exactly what it's doing. It runs on various publixcly
available lists and HOSTS files. Does it actually block Google's
various spyware domains, or are the developers only trying
to offer a tidbit of privacy without disturbing "online commerce"?
I don't know. To really research and control UO would be a lot
more work than just having a HOSTS file and NoScript.

I've also used firewalls since 1999 when I bought AtGuard.
That's increasingly important to block software calling home.
On OpenSuse I just set up OpenSnitch. It seems to work well.
On XP I have Online Armor. On 10 I think I was using Tinywall.
But then I found Simplewall which seems to be more comprehensive,
asking me about all outgoing attempts.

Re: Privacy / Cookie / Script etc add-ons

<ut9its$7444$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3187&group=alt.comp.software.firefox#3187

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: alan@invalid.com (Big Al)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 10:26:04 -0400
Organization: A noiseless patient Spider
Lines: 10
Message-ID: <ut9its$7444$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <ut9ib4$7780$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 18 Mar 2024 14:26:04 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="0322edd58a1a3dd187f5099bcae82625";
logging-data="233604"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18XvLEmMkxK3kxA1D2xx+UeiGG3Bbyytzs="
User-Agent: Mozilla Thunderbird
Cancel-Lock: sha1:Ze4F0zuutm1BeuIq0ctUyVFWhGc=
Content-Language: en-US
In-Reply-To: <ut9ib4$7780$1@dont-email.me>
 by: Big Al - Mon, 18 Mar 2024 14:26 UTC

On 3/18/24 10:15 AM, Newyana2 wrote:
> But then I found Simplewall which seems to be more comprehensive,
> asking me about all outgoing attempts.
I remember back in the win9x days maybe that I had a firewall like that, and may have been, as you
used it, it asked for every outgoing request. A bit annoying on first setup, but refreshing to know
what was going on. Especially nice for loading software that called home during install.
--
Linux Mint 21.3 Cinnamon 6.0.4
Al

Re: Privacy / Cookie / Script etc add-ons

<ut9tqb$9p26$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3188&group=alt.comp.software.firefox#3188

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Newyana2@invalid.nospam (Newyana2)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 13:31:48 -0400
Organization: A noiseless patient Spider
Lines: 55
Message-ID: <ut9tqb$9p26$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <ut9ib4$7780$1@dont-email.me> <ut9its$7444$1@dont-email.me>
Injection-Date: Mon, 18 Mar 2024 17:31:55 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="6b52fc33324991977d4b77d09e58c988";
logging-data="320582"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18dY8hwJ1L4VMEipzUdUG433w8xxAGo+dI="
Cancel-Lock: sha1:U1UpWmDPBnTQe/OgfOvB6rxRkdw=
X-MSMail-Priority: Normal
X-Priority: 3
X-Newsreader: Microsoft Outlook Express 6.00.2900.5512
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
 by: Newyana2 - Mon, 18 Mar 2024 17:31 UTC

"Big Al" <alan@invalid.com> wrote

| I remember back in the win9x days maybe that I had a firewall like that,
and may have been, as you
| used it, it asked for every outgoing request. A bit annoying on first
setup, but refreshing to know
| what was going on. Especially nice for loading software that called home
during install.

Yes. And usually one can choose to block one attempt
or enable/block all. Some of them also allow choosing what
ports are enabled.

On Win7 I think I have Private Firewall. I'm not so wild
about that one because it doesn't ask, so I have to
remember to specifically enable new programs.

I like Simplewall because it asks and also provides
clear settings. I can switch the status of anything at any
time. And it seems to be able to block all the Windows
reporting. It doesn't whitelist a pile of processes the
way that some firewalls do.

AtGuard was among the best ever. In '99 it was $30,
as I recall, but it was way ahead of its time. It controlled
outgoing and incoming. It also blocked ads based on
HTML code snippets. If it missed an ad one could drag it
to the rubbish barrel icon to teach AtGuard to recognize it.

One time I saw an ad for Visual Studio. For fun I decided
to drag it to the rubbish barrel icon, but apparently I used
the wrong mouse button or some such. Suddenly AtGuard
popped up and asked whether I wanted to allow DCOM to
go out. DCOM?! At the time I had no idea what that was.
I discovered that it meant runing COM objects remotely.
Apparently MS was going to run a COM object on my system
to check me out while I looked at their VS ad.... Interesting
lesson in privacy.

Not long after AtGuard came out, Symantec licensed it
exclusively and rebranded it as Norton. They doubled the price,
paid for fancy displays in stores selling software, and set some
700 programs to have online access by default. So it probably
seemed very stable, since it did almost nothing.

One could always tell the best software because Symantec would
buy it and ruin it. Norton utilities. Quarterdeck Clean Sweep.
Powerquest Drive Image. They bought all of them. With the
latter two Symantec pretty much removed all the functionality,
reducing them to useless backup utilities. Did MS pay them to
do that? I wonder. What sense is there is buying good software
only to break it?

Re: Privacy / Cookie / Script etc add-ons

<uta7bk$bn3n$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3189&group=alt.comp.software.firefox#3189

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!news.hispagatos.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Joerg Lorenz)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 21:14:44 +0100
Organization: Camembert Normand au Lait Cru
Lines: 13
Message-ID: <uta7bk$bn3n$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 18 Mar 2024 20:14:44 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="ab025803021e09961643facfd64cf9c8";
logging-data="384119"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/SP7PqVJEzdfIqxUMShXP2nkUaY9DzOS0="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.8.1
Cancel-Lock: sha1:pTTPX8gre0H1WE/a8uzXYkXAQEQ=
Content-Language: de-CH, en-GB
In-Reply-To: <ut99a6$56cd$1@dont-email.me>
 by: Joerg Lorenz - Mon, 18 Mar 2024 20:14 UTC

On 18.03.24 12:41, Big Al wrote:
> till I was told about it.

In FF on all OSs and also in Vivaldi:

uBlock Origin (easy to use out of the box)
NoScript (not so easy to use but extremely powerful)
DuckDuckGo Privacy Essentials (as part of DucDuckGo Search)

A different set in Safari.

--
"Manus manum lavat."

Re: Privacy / Cookie / Script etc add-ons

<uta9qt$192ml$1@paganini.bofh.team>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3190&group=alt.comp.software.firefox#3190

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!paganini.bofh.team!not-for-mail
From: noreply@njhbgfvc.jkuikjlmnb (Normal Killer)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 20:53:28 +0000
Organization: To protect and to server
Message-ID: <uta9qt$192ml$1@paganini.bofh.team>
References: <ut99a6$56cd$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain;
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 18 Mar 2024 20:57:01 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="1346261"; posting-host="lvwnlrZOTyXOUFTBTyWy3g.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
User-Agent: news.neodome.net
Cancel-Lock: sha256:i7DuhT2sZRnn4SjTgqqNtw9ARdDigB1K8B2bWdUV1QE=
X-Notice: Filtered by postfilter v. 0.9.3
Content-Language: en
 by: Normal Killer - Mon, 18 Mar 2024 20:53 UTC

On 18/03/2024 11:41, Big Al wrote:
> Starting a new thread here, but the subject came up of the
> places.sqlite file and visiting sites that loaded other sites etc etc
> etc.
>
> The conversation hit upon plugins/addons that stopped this.� I'm sure
> a good number of you try to stop the intrusions into your browser, so
> my question is, what tweaks/add-ons/plugins do you use to do this?
> Specifically the name and why so others might load the add-on too.
> I'm more curious than paranoid but I might just learn something. Hell,
> Ublock Origin was unknown till I was told about it.
>
I don't use anything. Just simple vanilla browser and login to Tik-Tok &
YouTube and post videos in the normal way. I don't worry about privacy.
I am just a normal serial killer and privacy doesn't affect me. Already
killed about 10 people and still free to walk without hindrance.

Re: Privacy / Cookie / Script etc add-ons

<65f8b7dd@news.ausics.net>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3191&group=alt.comp.software.firefox#3191

  copy link   Newsgroups: alt.comp.software.firefox
Message-ID: <65f8b7dd@news.ausics.net>
From: not@telling.you.invalid (Computer Nerd Kev)
Subject: Re: Privacy / Cookie / Script etc add-ons
Newsgroups: alt.comp.software.firefox
References: <ut99a6$56cd$1@dont-email.me>
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/2.4.31 (i586))
NNTP-Posting-Host: news.ausics.net
Date: 19 Mar 2024 07:53:33 +1000
Organization: Ausics - https://newsgroups.ausics.net
Lines: 25
X-Complaints: abuse@ausics.net
Path: i2pn2.org!i2pn.org!news.bbs.nz!news.ausics.net!not-for-mail
 by: Computer Nerd Kev - Mon, 18 Mar 2024 21:53 UTC

Big Al <alan@invalid.com> wrote:
> I'm sure a good number of you try to stop the intrusions into
> your browser, so my question is, what tweaks/add-ons/plugins do
> you use to do this?

NoScript and a whole bunch of about:config settings. Many of the
latter are about improving performance rather than privacy though,
so it would take time to pick out the ones relevent to this
question. The annoying ones are beacon.enabled = false and
network.http.sendRefererHeader = 0 because some websites won't work
with these settings. The extension that I used to toggle the
referer header automatically went wonky after a browser update, and
I can't find one to toggle beacon, so I'm doing both manually.

What I'd love is an extension to toggle any user-set about:config
setting depending on the website that is visited. In fact I'd like
similar functionality in NoScript where for example Google scripts
can be enabled just for certain websites where I'm forced to let
them through manually in order to pass through Google Captchas
without whitelisting them and allowing Google to track me on other
sites where that's not required.

--
__ __
#_ < |\| |< _#

Re: Privacy / Cookie / Script etc add-ons

<utaf99$dke7$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3192&group=alt.comp.software.firefox#3192

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: candycanearter07@candycanearter07.nomail.afraid (candycanearter07)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Mon, 18 Mar 2024 22:30:01 -0000 (UTC)
Organization: the-candyden-of-code
Lines: 26
Message-ID: <utaf99$dke7$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net>
Injection-Date: Mon, 18 Mar 2024 22:30:01 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="d09bac98fc82c3b0d9c9ff71d0e44da9";
logging-data="446919"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/+YnfpASVqe4QXpbuNzdWkTN6LlWadUNLsnQwhhmkqgw=="
User-Agent: slrn/pre1.0.4-9 (Linux)
Cancel-Lock: sha1:FOAL6SOJ1DaX8DEt9WIDHfY4GrQ=
 by: candycanearter07 - Mon, 18 Mar 2024 22:30 UTC

Computer Nerd Kev <not@telling.you.invalid> wrote at 21:53 this Monday (GMT):
> Big Al <alan@invalid.com> wrote:
>> I'm sure a good number of you try to stop the intrusions into
>> your browser, so my question is, what tweaks/add-ons/plugins do
>> you use to do this?
>
> NoScript and a whole bunch of about:config settings. Many of the
> latter are about improving performance rather than privacy though,
> so it would take time to pick out the ones relevent to this
> question. The annoying ones are beacon.enabled = false and
> network.http.sendRefererHeader = 0 because some websites won't work
> with these settings. The extension that I used to toggle the
> referer header automatically went wonky after a browser update, and
> I can't find one to toggle beacon, so I'm doing both manually.
>
> What I'd love is an extension to toggle any user-set about:config
> setting depending on the website that is visited. In fact I'd like
> similar functionality in NoScript where for example Google scripts
> can be enabled just for certain websites where I'm forced to let
> them through manually in order to pass through Google Captchas
> without whitelisting them and allowing Google to track me on other
> sites where that's not required.

NoScript is pretty good for that, I usually leave it on.
--
user <candycane> is generated from /dev/urandom

Re: Privacy / Cookie / Script etc add-ons

<65f90111@news.ausics.net>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3195&group=alt.comp.software.firefox#3195

  copy link   Newsgroups: alt.comp.software.firefox
Message-ID: <65f90111@news.ausics.net>
From: not@telling.you.invalid (Computer Nerd Kev)
Subject: Re: Privacy / Cookie / Script etc add-ons
Newsgroups: alt.comp.software.firefox
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net> <utaf99$dke7$1@dont-email.me>
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/2.4.31 (i686))
NNTP-Posting-Host: news.ausics.net
Date: 19 Mar 2024 13:05:53 +1000
Organization: Ausics - https://newsgroups.ausics.net
Lines: 35
X-Complaints: abuse@ausics.net
Path: i2pn2.org!i2pn.org!news.bbs.nz!news.ausics.net!not-for-mail
 by: Computer Nerd Kev - Tue, 19 Mar 2024 03:05 UTC

candycanearter07 <candycanearter07@candycanearter07.nomail.afraid> wrote:
> Computer Nerd Kev <not@telling.you.invalid> wrote at 21:53 this Monday (GMT):
>> What I'd love is an extension to toggle any user-set about:config
>> setting depending on the website that is visited. In fact I'd like
>> similar functionality in NoScript where for example Google scripts
>> can be enabled just for certain websites where I'm forced to let
>> them through manually in order to pass through Google Captchas
>> without whitelisting them and allowing Google to track me on other
>> sites where that's not required.
>
> NoScript is pretty good for that, I usually leave it on.

I think you missed my point. If I always leave it blocking Google
scripts then lots of websites requiring Google Captchas become
off-limits. But if I allow Google scripts by default in NoScript,
they get run on lots of websites that don't actually have Captchas,
so Google gets more info about my browsing than I need to give
them.

As it is I manually allow the Google scripts required for Captchas
when I need to, but it would be good to have a way in NoScript to
permit those scripts only on that website, so I wouldn't have to
keep doing it manually after the first visit.

It also applies to other scripts which often pop up where they're
not required, but on some sites they are. The Google Captchas are
especially annoying though because you need to reload the page
twice so one Google script can load another Google script which
also needs to be manually permitted before the Captcha will work.
Particularly annoying when my internet connection is being
slow/unreliable.

--
__ __
#_ < |\| |< _#

Re: Privacy / Cookie / Script etc add-ons

<utc1lj$r34u$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3196&group=alt.comp.software.firefox#3196

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Newyana2@invalid.nospam (Newyana2)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 08:49:47 -0400
Organization: A noiseless patient Spider
Lines: 59
Message-ID: <utc1lj$r34u$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net> <utaf99$dke7$1@dont-email.me> <65f90111@news.ausics.net>
Injection-Date: Tue, 19 Mar 2024 12:49:55 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="b7acf28ac7c05ffe8d4676804d0c270c";
logging-data="887966"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18cY8MfMXuERcwt6Tinh1/0jb7gp0dH7+4="
Cancel-Lock: sha1:vQ4rvRyu4CSMQSPYp4sU8etj6wA=
X-Priority: 3
X-MSMail-Priority: Normal
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
X-Newsreader: Microsoft Outlook Express 6.00.2900.5512
 by: Newyana2 - Tue, 19 Mar 2024 12:49 UTC

"Computer Nerd Kev" <not@telling.you.invalid> wrote

| I think you missed my point. If I always leave it blocking Google
| scripts then lots of websites requiring Google Captchas become
| off-limits. But if I allow Google scripts by default in NoScript,
| they get run on lots of websites that don't actually have Captchas,
| so Google gets more info about my browsing than I need to give
| them.
| | As it is I manually allow the Google scripts required for Captchas
| when I need to, but it would be good to have a way in NoScript to
| permit those scripts only on that website, so I wouldn't have to
| keep doing it manually after the first visit.
|

I've found that the source you need to allow is
from gstatic.com. I block over a dozen Google domains
in HOSTS. Pretty much everything except www.google.com,
which I occasionally use when I'm desperate to find
some info and I'm willing to wade through 3 pages of
ads, maps, bullshit categories, comparison shopping, and
so on. To the extent that their search actually works, it's
undeniably good.

The captchas disappear if I don't allow gstatic, but
otherwise seem to work. You could try that: whitelist
gstatic.com.

But I expect this situation is only going to get worse.
The line between website domains is disappearing. To a
great extent it's deliberate. It started way back when
Yahoo started using yimg.com to load images, breaking
the Firefox ability to block 3rd-party files. A 3rd-party
source is generally an ad or spyware (or worse) by definition,
but with CDN servers and multiple in-house domains, the
original design for online privacy is out the window. And now
there are often giant javascript "libraries" loading from
remote sources. It's getting to be like every page is an app,
and it's all obfuscated... and it's coming from a dozen domains.

With Flash at least you knew what Flash was, you could assess
the source, and you could decide whether to let it run. When
you're being dumped on by 5-20 MB of javascript, which
could even be compilable to native code, and which may be
coming from sources you've never heard of, all bets are off.
You're essentially running a medium-size software program from
an anonymous source.

Many of these sites are taking part in what the ad people call
a "program", meaning some kind of datamining arrangement.
A program like Akamai's "pixel-free" surveillance doesn't even
require loading remote files. Akamai is spying on the Internet
itself, acting as a massive backend CDN service. And of course,
Google is arguably the grandfather of sleazeball surveillance
programs, getting multiple spyware plants on nearly all commercial
websites through analytics, adsense, maps, fonts and so on.

Re: Privacy / Cookie / Script etc add-ons

<20240319080426.0431124f@Johnny>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3197&group=alt.comp.software.firefox#3197

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: johnny@invalid.net (Johnny)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 08:04:26 -0500
Organization: A noiseless patient Spider
Lines: 64
Message-ID: <20240319080426.0431124f@Johnny>
References: <ut99a6$56cd$1@dont-email.me>
<65f8b7dd@news.ausics.net>
<utaf99$dke7$1@dont-email.me>
<65f90111@news.ausics.net>
<utc1lj$r34u$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
Injection-Info: dont-email.me; posting-host="97aa98e5b23ba669abdececce0f95515";
logging-data="832778"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX195XcEhnz/plnklVcDRrWtT"
Cancel-Lock: sha1:J0M8nL940v3f1zD4f3hyhIqo1dg=
X-Newsreader: Claws Mail 4.1.1 (GTK 3.24.38; x86_64-pc-linux-gnu)
 by: Johnny - Tue, 19 Mar 2024 13:04 UTC

On Tue, 19 Mar 2024 08:49:47 -0400
"Newyana2" <Newyana2@invalid.nospam> wrote:

> "Computer Nerd Kev" <not@telling.you.invalid> wrote
>
>
> | I think you missed my point. If I always leave it blocking Google
> | scripts then lots of websites requiring Google Captchas become
> | off-limits. But if I allow Google scripts by default in NoScript,
> | they get run on lots of websites that don't actually have
> Captchas, | so Google gets more info about my browsing than I need
> to give | them.
> |
> | As it is I manually allow the Google scripts required for Captchas
> | when I need to, but it would be good to have a way in NoScript to
> | permit those scripts only on that website, so I wouldn't have to
> | keep doing it manually after the first visit.
> |
>
> I've found that the source you need to allow is
> from gstatic.com. I block over a dozen Google domains
> in HOSTS. Pretty much everything except www.google.com,
> which I occasionally use when I'm desperate to find
> some info and I'm willing to wade through 3 pages of
> ads, maps, bullshit categories, comparison shopping, and
> so on. To the extent that their search actually works, it's
> undeniably good.
>
> The captchas disappear if I don't allow gstatic, but
> otherwise seem to work. You could try that: whitelist
> gstatic.com.
>
> But I expect this situation is only going to get worse.
> The line between website domains is disappearing. To a
> great extent it's deliberate. It started way back when
> Yahoo started using yimg.com to load images, breaking
> the Firefox ability to block 3rd-party files. A 3rd-party
> source is generally an ad or spyware (or worse) by definition,
> but with CDN servers and multiple in-house domains, the
> original design for online privacy is out the window. And now
> there are often giant javascript "libraries" loading from
> remote sources. It's getting to be like every page is an app,
> and it's all obfuscated... and it's coming from a dozen domains.
>
> With Flash at least you knew what Flash was, you could assess
> the source, and you could decide whether to let it run. When
> you're being dumped on by 5-20 MB of javascript, which
> could even be compilable to native code, and which may be
> coming from sources you've never heard of, all bets are off.
> You're essentially running a medium-size software program from
> an anonymous source.
>
> Many of these sites are taking part in what the ad people call
> a "program", meaning some kind of datamining arrangement.
> A program like Akamai's "pixel-free" surveillance doesn't even
> require loading remote files. Akamai is spying on the Internet
> itself, acting as a massive backend CDN service. And of course,
> Google is arguably the grandfather of sleazeball surveillance
> programs, getting multiple spyware plants on nearly all commercial
> websites through analytics, adsense, maps, fonts and so on.

I never use Google, and block all Google scripts with NoScript.

Re: Privacy / Cookie / Script etc add-ons

<utcfq5$u2vv$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3198&group=alt.comp.software.firefox#3198

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Joerg Lorenz)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 17:51:17 +0100
Organization: Camembert Normand au Lait Cru
Lines: 9
Message-ID: <utcfq5$u2vv$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net>
<utaf99$dke7$1@dont-email.me> <65f90111@news.ausics.net>
<utc1lj$r34u$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 19 Mar 2024 16:51:17 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="b630e81463d90085eb0b7db2dd390745";
logging-data="986111"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+RpaO8JJbbsOc2s9nGYVvsapPGJqfJ/yk="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.8.1
Cancel-Lock: sha1:t4vE0/iSO7hwaxhdxlNlGt5sA30=
In-Reply-To: <utc1lj$r34u$1@dont-email.me>
Content-Language: de-CH, en-GB
 by: Joerg Lorenz - Tue, 19 Mar 2024 16:51 UTC

On 19.03.24 13:49, Newyana2 wrote:
> I've found that the source you need to allow is
> from gstatic.com.

This one allows the access to pictures. It is not clever to block this
script. One of the very few I accept from Google.

--
"Manus manum lavat."

Re: Privacy / Cookie / Script etc add-ons

<utcfsu$u2vv$2@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3199&group=alt.comp.software.firefox#3199

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Joerg Lorenz)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 17:52:46 +0100
Organization: Camembert Normand au Lait Cru
Lines: 12
Message-ID: <utcfsu$u2vv$2@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net>
<utaf99$dke7$1@dont-email.me> <65f90111@news.ausics.net>
<utc1lj$r34u$1@dont-email.me> <20240319080426.0431124f@Johnny>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 19 Mar 2024 16:52:46 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="b630e81463d90085eb0b7db2dd390745";
logging-data="986111"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18vXvPXw0KuOmw0bR4DyM0PPeC4SXSn2h4="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.8.1
Cancel-Lock: sha1:9sXalXgc5i1CJ8iKA8VnKI05kmQ=
In-Reply-To: <20240319080426.0431124f@Johnny>
Content-Language: de-CH, en-GB
 by: Joerg Lorenz - Tue, 19 Mar 2024 16:52 UTC

On 19.03.24 14:04, Johnny wrote:

> I never use Google, and block all Google scripts with NoScript.

Not very clever and does not improve your privacy. Accept the two:

google.com
gstatic.com

--
"Manus manum lavat."

Re: Privacy / Cookie / Script etc add-ons

<utcgsm$uian$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3201&group=alt.comp.software.firefox#3201

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Newyana2@invalid.nospam (Newyana2)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 13:09:34 -0400
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <utcgsm$uian$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me><65f8b7dd@news.ausics.net><utaf99$dke7$1@dont-email.me><65f90111@news.ausics.net><utc1lj$r34u$1@dont-email.me> <20240319080426.0431124f@Johnny>
Injection-Date: Tue, 19 Mar 2024 17:09:43 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="b7acf28ac7c05ffe8d4676804d0c270c";
logging-data="1001815"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/dsYG/gDxZBm3DtAAParPJwWc3+HEDeyk="
Cancel-Lock: sha1:QyPTE5D1Ax0pKFwBbp5ksbYPpB8=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
X-MSMail-Priority: Normal
X-Newsreader: Microsoft Outlook Express 6.00.2900.5512
X-Priority: 3
 by: Newyana2 - Tue, 19 Mar 2024 17:09 UTC

"Johnny" <johnny@invalid.net> wrote

| I never use Google, and block all Google scripts with NoScript.
| That helps, though blocking the domains is better. In many
cases these snoops will use web bugs (1x1 pixel fake images)
to make you call their server and thereby get tracking data.

These are my Acrylic HOSTS entries for Google alone (which
doesn't include the maps URL):

127.0.0.1 *.googleusercontent.com
127.0.0.1 *.googlesyndication.com
127.0.0.1 *.googleadservices.com
127.0.0.1 *.googlecommerce.com
127.0.0.1 *.1e100.com
127.0.0.1 *.1e100.net
127.0.0.1 *.doubleclick.net
127.0.0.1 *.doubleclick.com
127.0.0.1 *.googletagservices.com
127.0.0.1 *.googletagmanager.com
127.0.0.1 *.google-analytics.com
127.0.0.1 google-analytics.com
127.0.0.1 fonts.googleapis.com
127.0.0.1 *.2mdn.net
127.0.0.1 googleadapis.l.google.com
#127.0.0.1 *.gstatic.com
127.0.0.1 plusone.google.com
127.0.0.1 cse.google.com
127.0.0.1 www.google.com/cse
127.0.0.1 www.youtube-nocookie.com
127.0.0.1 *.appspot.com

Re: Privacy / Cookie / Script etc add-ons

<utcj8o$v13s$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3204&group=alt.comp.software.firefox#3204

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 18:50:16 +0100
Organization: Camembert Normand au Lait Cru
Lines: 39
Message-ID: <utcj8o$v13s$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net>
<utaf99$dke7$1@dont-email.me> <65f90111@news.ausics.net>
<utc1lj$r34u$1@dont-email.me> <20240319080426.0431124f@Johnny>
<utcgsm$uian$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 19 Mar 2024 17:50:16 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="39b3ad7746366faa322cfb9009577494";
logging-data="1016956"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/1RIt63oNoL/Oz+0hHhpfYnmZIdAyZciA="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:115.0)
Gecko/20100101 Thunderbird/115.8.1
Cancel-Lock: sha1:R58patedgFLYTgiKhicIvJ4ewCc=
In-Reply-To: <utcgsm$uian$1@dont-email.me>
Content-Language: de-CH
 by: Jörg Lorenz - Tue, 19 Mar 2024 17:50 UTC

Am 19.03.24 um 18:09 schrieb Newyana2:
> "Johnny" <johnny@invalid.net> wrote
>
> | I never use Google, and block all Google scripts with NoScript.
> |
> That helps, though blocking the domains is better. In many
> cases these snoops will use web bugs (1x1 pixel fake images)
> to make you call their server and thereby get tracking data.
>
> These are my Acrylic HOSTS entries for Google alone (which
> doesn't include the maps URL):
>
> 127.0.0.1 *.googleusercontent.com
> 127.0.0.1 *.googlesyndication.com
> 127.0.0.1 *.googleadservices.com
> 127.0.0.1 *.googlecommerce.com
> 127.0.0.1 *.1e100.com
> 127.0.0.1 *.1e100.net
> 127.0.0.1 *.doubleclick.net
> 127.0.0.1 *.doubleclick.com
> 127.0.0.1 *.googletagservices.com
> 127.0.0.1 *.googletagmanager.com
> 127.0.0.1 *.google-analytics.com
> 127.0.0.1 google-analytics.com
> 127.0.0.1 fonts.googleapis.com
> 127.0.0.1 *.2mdn.net
> 127.0.0.1 googleadapis.l.google.com
> #127.0.0.1 *.gstatic.com
> 127.0.0.1 plusone.google.com
> 127.0.0.1 cse.google.com
> 127.0.0.1 www.google.com/cse
> 127.0.0.1 www.youtube-nocookie.com
> 127.0.0.1 *.appspot.com

These are no news.

--
"Gutta cavat lapidem." (Ovid)

Re: Privacy / Cookie / Script etc add-ons

<utcmdi$vr24$1@dont-email.me>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3206&group=alt.comp.software.firefox#3206

  copy link   Newsgroups: alt.comp.software.firefox
Path: i2pn2.org!i2pn.org!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: worldoff9908@gmail.com (NFN Smith)
Newsgroups: alt.comp.software.firefox
Subject: Re: Privacy / Cookie / Script etc add-ons
Date: Tue, 19 Mar 2024 11:44:00 -0700
Organization: A noiseless patient Spider
Lines: 51
Message-ID: <utcmdi$vr24$1@dont-email.me>
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net>
<utaf99$dke7$1@dont-email.me> <65f90111@news.ausics.net>
<utc1lj$r34u$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 19 Mar 2024 18:44:02 -0000 (UTC)
Injection-Info: dont-email.me; posting-host="7179ded216e42e09bb83485a3a6accf8";
logging-data="1043524"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19cG3qMISgblZYi3CTPLxjk6lFQbBJFXNM="
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.1
Cancel-Lock: sha1:OV7vJ+BrHq9nDG2v4H5uTIKAFkQ=
In-Reply-To: <utc1lj$r34u$1@dont-email.me>
 by: NFN Smith - Tue, 19 Mar 2024 18:44 UTC

Newyana2 wrote:
> "Computer Nerd Kev" <not@telling.you.invalid> wrote
>

> |
> | As it is I manually allow the Google scripts required for Captchas
> | when I need to, but it would be good to have a way in NoScript to
> | permit those scripts only on that website, so I wouldn't have to
> | keep doing it manually after the first visit.
> |
>
> I've found that the source you need to allow is
> from gstatic.com. I block over a dozen Google domains
> in HOSTS. Pretty much everything except www.google.com,
> which I occasionally use when I'm desperate to find
> some info and I'm willing to wade through 3 pages of
> ads, maps, bullshit categories, comparison shopping, and
> so on. To the extent that their search actually works, it's
> undeniably good.

A lot depends on what sites you go to, and what scripting they're
running. With gstatic, I can leave that blocked a lot of the time, but
there are sites that won't work unless it's active. The same things
apply to things like googletagmanager and ajax.googleapis.com.

Yes, I know that there's a lot of Google information collection with
some of those domains, but if an application is built in AJAX, it won't
run if the necessary scripting isn't enabled. I've also seen plenty of
sites that use googletagmanager as the tool for doing field-level
validity checking in forms. If the scripting isn't enabled, you can't
even enter data into fields. And I've also seen sites that use Google's
fonts that won't work unless they can get the fonts from
fonts.gstatic.com. I don't know if the top level of gstatic is
necessary or not, but the site definitely needs the fonts.

The only Google site that I'm entirely confident of permanently
blacklisting via NoScript is Google Analytics.

Thus, I blacklist everything as a default, but if a site isn't rendering
properly, I'm not surprised if I have to manually enable one or more
Google domains to get things working.

>
> The captchas disappear if I don't allow gstatic, but
> otherwise seem to work. You could try that: whitelist
> gstatic.com.

I've noticed that captchas are more prevalent if scripting is blocked,
although I never made the link with gstatic.

Smith

Re: Privacy / Cookie / Script etc add-ons

<65fa1627@news.ausics.net>

  copy mid

http://rslight.i2p/computers/article-flat.php?id=3214&group=alt.comp.software.firefox#3214

  copy link   Newsgroups: alt.comp.software.firefox
Message-ID: <65fa1627@news.ausics.net>
From: not@telling.you.invalid (Computer Nerd Kev)
Subject: Re: Privacy / Cookie / Script etc add-ons
Newsgroups: alt.comp.software.firefox
References: <ut99a6$56cd$1@dont-email.me> <65f8b7dd@news.ausics.net> <utaf99$dke7$1@dont-email.me> <65f90111@news.ausics.net> <utc1lj$r34u$1@dont-email.me>
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/2.4.31 (i586))
NNTP-Posting-Host: news.ausics.net
Date: 20 Mar 2024 08:48:07 +1000
Organization: Ausics - https://newsgroups.ausics.net
Lines: 83
X-Complaints: abuse@ausics.net
Path: i2pn2.org!i2pn.org!news.bbs.nz!news.ausics.net!not-for-mail
 by: Computer Nerd Kev - Tue, 19 Mar 2024 22:48 UTC

Newyana2 <Newyana2@invalid.nospam> wrote:
> "Computer Nerd Kev" <not@telling.you.invalid> wrote
>
> | I think you missed my point. If I always leave it blocking Google
> | scripts then lots of websites requiring Google Captchas become
> | off-limits. But if I allow Google scripts by default in NoScript,
> | they get run on lots of websites that don't actually have Captchas,
> | so Google gets more info about my browsing than I need to give
> | them.
> |
> | As it is I manually allow the Google scripts required for Captchas
> | when I need to, but it would be good to have a way in NoScript to
> | permit those scripts only on that website, so I wouldn't have to
> | keep doing it manually after the first visit.
> |
>
> I've found that the source you need to allow is
> from gstatic.com. I block over a dozen Google domains
> in HOSTS. Pretty much everything except www.google.com,
> which I occasionally use when I'm desperate to find
> some info and I'm willing to wade through 3 pages of
> ads, maps, bullshit categories, comparison shopping, and
> so on. To the extent that their search actually works, it's
> undeniably good.
>
> The captchas disappear if I don't allow gstatic, but
> otherwise seem to work. You could try that: whitelist
> gstatic.com.

Oh I know, that's exactly what I was just talking about. Except you
only see "gstatic.com" in the NoScript menu after it's requested by
another Google script from "google.com" first, which I also need to
manually allow.

So eg.
webpage with form to submit.
v
enter details and submit.
v
receive meaningless error message
or no response at all.
v
NoScript -> temp. allow google.com.
v
page reloads (often with a blank form
missing all the info I just filled in - argh!).
v
NoScript -> temp. allow gstatic.com.
v
page reloads again now displaying some Google
reCaptcha button/symbol that wasn't there before.
v
finally I can fill in the form again, maybe
solve a captcha or two, and eventually submit
the damn form!

Can people here understand that? That's why I want the feature to
whitelist those scripts on sites (or, even better, specific pages)
using Google Captchas.

> Many of these sites are taking part in what the ad people call
> a "program", meaning some kind of datamining arrangement.
> A program like Akamai's "pixel-free" surveillance doesn't even
> require loading remote files. Akamai is spying on the Internet
> itself, acting as a massive backend CDN service. And of course,
> Google is arguably the grandfather of sleazeball surveillance
> programs, getting multiple spyware plants on nearly all commercial
> websites through analytics, adsense, maps, fonts and so on.

Yes and that's exactly why I don't allow gstatic.com and google.com
everywhere. I do always block googleanalytics.com by default, which
is what Google use to collect analytics data for others. What's to
say they don't collect data for themselves from google.com and
gstatic.com? Nothing at all, in fact they probably do, and that data
can be used to track what site you're visiting just like
googleanalytics.com. Blocking one and allowing the other is
borderline pointless, since the others not found only where Captchas
are used. Which I thought would be obvious to anyone using NoScript,
but I guess maybe it isn't.

--
__ __
#_ < |\| |< _#


computers / alt.comp.software.firefox / Privacy / Cookie / Script etc add-ons

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor