SlideShare a Scribd company logo
Do not track me
Vikrant Kamble
Jamnalal Institute of Management Studies
MIM 17-I-109 (2017-2020)
Definition of Internet Privacy
Internet Privacy is the ability of individuals to control the flow of information and
have reasonable access to data generated during a browsing session.
Internet privacy is the privacy and security level of personal data published via the
Internet.
Social Media
Social media are Internet-based applications.
User-generated content (UGC) is the lifeblood of the social media organism.
Users create service-specific profiles for the site or app that are designed and
maintained by the social media organization.
Social media facilitate the development of online social networks by connecting a
user's profile with those of other individuals or groups.
Common social media sites
The term social media is usually used to describe social networking sites such as:
1. Facebook
2. Twitter
3. LinkedIn
4. Instagram
5. Snapchat
6. Pinterest
IP Addresses
Your privacy extends to your IP address. Every time you visit a website your IP
address is logged. Your IP address tells the website (and the people that run it)
approximately where you are. They know your city or state based on your IP
address.
To protect your IP address you can use a proxy browser like TOR Browser.
Cookies
A web cookie is just a text file placed on your computer, usually by a website.
Sometimes cookies are 'session' based meaning they only work while you are on a
site. Other cookies are 'persistent' meaning they continue to exist long after you
have left a site. Normally, it tracks your visits so the website knows you are a
returning visitor, or what ads to show you.
Benefit from data
This accessible data along with data mining technology, users' information can be
used in different ways to improve customer service.
According to what you retweet, what you like and the hashtag, Twitter can
recommend some topics and advertisements. Twitter's suggestions for who to
follow is done by this recommendation system. Commerce, such as Amazon,
make use of users' information to recommend items for users. Recommendations
are based on at least prior purchases, shopping cart, and wishlist. Affinity analysis
is a data mining technique that used to understand the purchase behavior of
customers.
More than 1,000 companies are waiting in line to get
access to millions of tweets from users that are
using the popular social networking website.
Companies believe that by using data mining
technologies they would be able to gather important
information that can be used for marketing and
advertising.
Facebook Advertisement
A leaked document from Facebook has revealed that the company was able to
identify "insecure, worthless, stressed or defeated" emotions, especially in
teenagers, and then proceeded to inform advertisers. While similar issues have
arisen in the past, this continues to make individuals’ emotional states seem more
like a commodity. They are able to target certain age groups depending on the
time that their advertisements appear.
Source: https://www.usatoday.com/story/tech/news/2017/05/01/facebook-can-tell-when-teens-feel-
insecure-advertiser-target/101158752/
The illusion of anonymity
Many people, believe that while using the web, little can be done to invade their
privacy. This is called illusion of anonymity.
How to browse web w/o being tracked
Browse web using Incognito mode
Third-party cookies – small text files that
track your movement between various
sites – are blocked, and first-party
cookies (which track your movement
within a site in order to keep track of, say,
your shopping basket or preferences) are
deleted at the end of the session, so that
the next time someone visits that site, it
won't be clear that you'd been there too.
Kill all cookies
Download the free CCleaner to clear
both Flash and regular cookies, but
be warned – some sites use third-
party cookies to track you within the
site, so you may find yourself having
to sign in repeatedly.
Stop your browser sending location data
Chrome – Preferences > Settings > Advanced > Content settings, and choose to either disallow any site to
track your physical location, or ask when a site wants to track.
Safari – Preferences > Privacy, where you can disable location services, or let each website make a
request.
Firefox – Type “about:config” in the URL bar, then “geo.enabled”. Double-click to disable location entirely.
Otherwise, Firefox always asks before sending your location to a website.
Microsoft Edge – You don't set this using the Edge browser. You'll need to turn off location tracking using
your computer's main Settings > Privacy and then scroll down to Choose apps that can use your precise
location and toggle Microsoft Edge to Off.
Search anonymously
To prevent your searches being tracked – and affecting the ads you're shown –
switch to a private search engine such as DuckDuckGo.
Stop Google tracking you
Download the Google Analytics Browser Add-on to stop Google Analytics using
data on your movements to create profiles for its ad partners. Opt out of “shared
endorsement” in ads and turn off ad personalization (you'll still be shown ads, but
they won't be targeted).
Stop social sites figuring you out
Head to Facebook's Settings / Adverts to control whether ads are targeted based
on your clicks in and out of Facebook; for Twitter, Settings / Security and Privacy,
then uncheck the box for “Tailor ads...”; for LinkedIn, Privacy & Settings / Account
/ Manage Advertising Preferences.
In each of these cases, you won't receive ads based on your browsing, but you'll
still be tracked for security reasons. (However, some sites, including Twitter, honor
the Do Not Track setting found in your browser's privacy settings, which means
they will not log your presence at their site.)
Block all trackers
Download an anti-tracker plugin which blocks tracking cookies to prevent ad
analytics companies from building a grand profile of just where you like to go on
the internet.
1. Privacy Badger
2. Ublock Origin
3. Ghostery
4. Https everywhere
Apps on mobile devices
Opera VPN blocks ad trackers and lets you
change your virtual location. Unblock more
content and access your favorite websites
and apps from anywhere - completely free.
Browse like no one’s watching. The new
Firefox Focus automatically blocks a wide
range of ads and online trackers Easily
erase your history, passwords and cookies,
so you won’t get followed by things like
unwanted ads.
Conclusion
There are more ways to go all anonymous, like using VPN and Tor Browser along
with the add-ons mentioned today in this presentation.
Browsing the web anonymously is good but it comes with some limitations, you
will have slower internet speed as your traffic is relayed from another country, TOR
does not allow resizing the browser window, download files etc.
Browse securely with apps and add-ons mentioned. Don't share addresses,
contacts with anyone online. Make use of privacy settings on social media so only
people you choose and trust, relatives, friends can see your data.
Thank you.

More Related Content

What's hot

Facebook Smart Card
Facebook Smart CardFacebook Smart Card
Online privacy
Online privacyOnline privacy
Online privacy
Nicko Sapnu
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
Naval OPSEC
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
Naval OPSEC
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
Joint Base Myer-Henderson Hall
 
Does facebook federation have your best interests at heart
Does facebook federation have your best interests at heartDoes facebook federation have your best interests at heart
Does facebook federation have your best interests at heart
PerfectCloud Corp.
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
Anna Adel
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
Mark Rogers
 
Log off from the internet, step by step
Log off from the internet, step by stepLog off from the internet, step by step
Log off from the internet, step by step
niraj joshi
 
security procedures
security procedures
security procedures
security procedures
offbeatnominee633
 
Instagram Policy primer
Instagram Policy primerInstagram Policy primer
Instagram Policy primer
RhiJohn
 
Security Paper
Security PaperSecurity Paper
Security Paper
Shante' Perrin
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
Norfolk Naval Shipyard
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
Naval OPSEC
 
Linkedln smart card
Linkedln smart cardLinkedln smart card
Linkedln smart card
Elizabeth Jamison
 
project1lis3353 (1)
project1lis3353 (1)project1lis3353 (1)
project1lis3353 (1)
Monte VanDyke
 
LinkedIn Smart Card
LinkedIn Smart CardLinkedIn Smart Card
online spying tools
online spying toolsonline spying tools
online spying tools
Deepa Jacob
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
Liberteks
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
farazmajeed27
 

What's hot (20)

Facebook Smart Card
Facebook Smart CardFacebook Smart Card
Facebook Smart Card
 
Online privacy
Online privacyOnline privacy
Online privacy
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 
Smartphone 7 aug14
Smartphone 7 aug14Smartphone 7 aug14
Smartphone 7 aug14
 
Social Media Safety
Social Media SafetySocial Media Safety
Social Media Safety
 
Does facebook federation have your best interests at heart
Does facebook federation have your best interests at heartDoes facebook federation have your best interests at heart
Does facebook federation have your best interests at heart
 
Digital privacy
Digital privacyDigital privacy
Digital privacy
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Log off from the internet, step by step
Log off from the internet, step by stepLog off from the internet, step by step
Log off from the internet, step by step
 
security procedures
security procedures
security procedures
security procedures
 
Instagram Policy primer
Instagram Policy primerInstagram Policy primer
Instagram Policy primer
 
Security Paper
Security PaperSecurity Paper
Security Paper
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Opt out-3 jul2014
Opt out-3 jul2014Opt out-3 jul2014
Opt out-3 jul2014
 
Linkedln smart card
Linkedln smart cardLinkedln smart card
Linkedln smart card
 
project1lis3353 (1)
project1lis3353 (1)project1lis3353 (1)
project1lis3353 (1)
 
LinkedIn Smart Card
LinkedIn Smart CardLinkedIn Smart Card
LinkedIn Smart Card
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
2013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-05502013 09 liberteks monthly security tips newsletter 518-452-0550
2013 09 liberteks monthly security tips newsletter 518-452-0550
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 

Similar to Do not track me

Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
Archana Dwivedi
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
lilyanariz
 
Explorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithmExplorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithm
Ansgar Koene
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Privacy Controversy
Privacy ControversyPrivacy Controversy
Privacy Controversy
AlyssaVanDurme
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
Matthew Momney
 
Digital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsDigital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking Methods
Honza Pav
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
MIsmail73
 
MF10TrackingProtection
MF10TrackingProtectionMF10TrackingProtection
MF10TrackingProtection
Consumers Union
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
Alpha Company, AFNORTH Battalion SFRG
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
OMNIRISC SECURITY SERVICES
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
J_waut14
 
Cookie management
Cookie managementCookie management
Cookie management
Harris Geift
 
Mozilla Firefox for Mac
Mozilla Firefox for MacMozilla Firefox for Mac
Mozilla Firefox for Mac
Consumers Union
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
brendaylo
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
COMP 113
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
nerakmac
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
John Curry
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
shanikosh
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
devashishicai
 

Similar to Do not track me (20)

Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Online Privacy Lilyana Ruiz
Online Privacy Lilyana RuizOnline Privacy Lilyana Ruiz
Online Privacy Lilyana Ruiz
 
Explorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithmExplorers fair talk who_isincontrol_you_thealgorithm
Explorers fair talk who_isincontrol_you_thealgorithm
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Privacy Controversy
Privacy ControversyPrivacy Controversy
Privacy Controversy
 
Internet privacy presentation
Internet privacy presentationInternet privacy presentation
Internet privacy presentation
 
Digital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking MethodsDigital Advertising, Privacy and User-tracking Methods
Digital Advertising, Privacy and User-tracking Methods
 
Cookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptxCookies and Privacy of internet in this presentation.pptx
Cookies and Privacy of internet in this presentation.pptx
 
MF10TrackingProtection
MF10TrackingProtectionMF10TrackingProtection
MF10TrackingProtection
 
Keeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart CardKeeping Your Kids Safe Online Smart Card
Keeping Your Kids Safe Online Smart Card
 
Cyber security macau
Cyber security macau Cyber security macau
Cyber security macau
 
Presentation portfolio E-business
Presentation portfolio E-business Presentation portfolio E-business
Presentation portfolio E-business
 
Cookie management
Cookie managementCookie management
Cookie management
 
Mozilla Firefox for Mac
Mozilla Firefox for MacMozilla Firefox for Mac
Mozilla Firefox for Mac
 
Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235Brandon + Eddie users guide phi 235
Brandon + Eddie users guide phi 235
 
6: privacy terms
6: privacy terms6: privacy terms
6: privacy terms
 
Techniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools SaferTechniques For Making 21st Century Learning Tools Safer
Techniques For Making 21st Century Learning Tools Safer
 
Privacy Online
Privacy OnlinePrivacy Online
Privacy Online
 
Group 2 privacy and me in a web 2.0 world final
Group 2   privacy and me in a web 2.0 world  finalGroup 2   privacy and me in a web 2.0 world  final
Group 2 privacy and me in a web 2.0 world final
 
Data privacy over internet
Data privacy over internetData privacy over internet
Data privacy over internet
 

Recently uploaded

办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 

Recently uploaded (20)

办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 

Do not track me

  • 1. Do not track me Vikrant Kamble Jamnalal Institute of Management Studies MIM 17-I-109 (2017-2020)
  • 2. Definition of Internet Privacy Internet Privacy is the ability of individuals to control the flow of information and have reasonable access to data generated during a browsing session. Internet privacy is the privacy and security level of personal data published via the Internet.
  • 3. Social Media Social media are Internet-based applications. User-generated content (UGC) is the lifeblood of the social media organism. Users create service-specific profiles for the site or app that are designed and maintained by the social media organization. Social media facilitate the development of online social networks by connecting a user's profile with those of other individuals or groups.
  • 4. Common social media sites The term social media is usually used to describe social networking sites such as: 1. Facebook 2. Twitter 3. LinkedIn 4. Instagram 5. Snapchat 6. Pinterest
  • 5. IP Addresses Your privacy extends to your IP address. Every time you visit a website your IP address is logged. Your IP address tells the website (and the people that run it) approximately where you are. They know your city or state based on your IP address. To protect your IP address you can use a proxy browser like TOR Browser.
  • 6. Cookies A web cookie is just a text file placed on your computer, usually by a website. Sometimes cookies are 'session' based meaning they only work while you are on a site. Other cookies are 'persistent' meaning they continue to exist long after you have left a site. Normally, it tracks your visits so the website knows you are a returning visitor, or what ads to show you.
  • 7. Benefit from data This accessible data along with data mining technology, users' information can be used in different ways to improve customer service. According to what you retweet, what you like and the hashtag, Twitter can recommend some topics and advertisements. Twitter's suggestions for who to follow is done by this recommendation system. Commerce, such as Amazon, make use of users' information to recommend items for users. Recommendations are based on at least prior purchases, shopping cart, and wishlist. Affinity analysis is a data mining technique that used to understand the purchase behavior of customers.
  • 8. More than 1,000 companies are waiting in line to get access to millions of tweets from users that are using the popular social networking website. Companies believe that by using data mining technologies they would be able to gather important information that can be used for marketing and advertising.
  • 9. Facebook Advertisement A leaked document from Facebook has revealed that the company was able to identify "insecure, worthless, stressed or defeated" emotions, especially in teenagers, and then proceeded to inform advertisers. While similar issues have arisen in the past, this continues to make individuals’ emotional states seem more like a commodity. They are able to target certain age groups depending on the time that their advertisements appear. Source: https://www.usatoday.com/story/tech/news/2017/05/01/facebook-can-tell-when-teens-feel- insecure-advertiser-target/101158752/
  • 10. The illusion of anonymity Many people, believe that while using the web, little can be done to invade their privacy. This is called illusion of anonymity.
  • 11. How to browse web w/o being tracked Browse web using Incognito mode Third-party cookies – small text files that track your movement between various sites – are blocked, and first-party cookies (which track your movement within a site in order to keep track of, say, your shopping basket or preferences) are deleted at the end of the session, so that the next time someone visits that site, it won't be clear that you'd been there too.
  • 12. Kill all cookies Download the free CCleaner to clear both Flash and regular cookies, but be warned – some sites use third- party cookies to track you within the site, so you may find yourself having to sign in repeatedly.
  • 13. Stop your browser sending location data Chrome – Preferences > Settings > Advanced > Content settings, and choose to either disallow any site to track your physical location, or ask when a site wants to track. Safari – Preferences > Privacy, where you can disable location services, or let each website make a request. Firefox – Type “about:config” in the URL bar, then “geo.enabled”. Double-click to disable location entirely. Otherwise, Firefox always asks before sending your location to a website. Microsoft Edge – You don't set this using the Edge browser. You'll need to turn off location tracking using your computer's main Settings > Privacy and then scroll down to Choose apps that can use your precise location and toggle Microsoft Edge to Off.
  • 14. Search anonymously To prevent your searches being tracked – and affecting the ads you're shown – switch to a private search engine such as DuckDuckGo.
  • 15. Stop Google tracking you Download the Google Analytics Browser Add-on to stop Google Analytics using data on your movements to create profiles for its ad partners. Opt out of “shared endorsement” in ads and turn off ad personalization (you'll still be shown ads, but they won't be targeted).
  • 16. Stop social sites figuring you out Head to Facebook's Settings / Adverts to control whether ads are targeted based on your clicks in and out of Facebook; for Twitter, Settings / Security and Privacy, then uncheck the box for “Tailor ads...”; for LinkedIn, Privacy & Settings / Account / Manage Advertising Preferences. In each of these cases, you won't receive ads based on your browsing, but you'll still be tracked for security reasons. (However, some sites, including Twitter, honor the Do Not Track setting found in your browser's privacy settings, which means they will not log your presence at their site.)
  • 17. Block all trackers Download an anti-tracker plugin which blocks tracking cookies to prevent ad analytics companies from building a grand profile of just where you like to go on the internet. 1. Privacy Badger 2. Ublock Origin 3. Ghostery 4. Https everywhere
  • 18. Apps on mobile devices Opera VPN blocks ad trackers and lets you change your virtual location. Unblock more content and access your favorite websites and apps from anywhere - completely free. Browse like no one’s watching. The new Firefox Focus automatically blocks a wide range of ads and online trackers Easily erase your history, passwords and cookies, so you won’t get followed by things like unwanted ads.
  • 19. Conclusion There are more ways to go all anonymous, like using VPN and Tor Browser along with the add-ons mentioned today in this presentation. Browsing the web anonymously is good but it comes with some limitations, you will have slower internet speed as your traffic is relayed from another country, TOR does not allow resizing the browser window, download files etc. Browse securely with apps and add-ons mentioned. Don't share addresses, contacts with anyone online. Make use of privacy settings on social media so only people you choose and trust, relatives, friends can see your data.