Disrupting Surveillance: Critical Software Design-Led Practice to Obfuscate and Reveal Surveillance Economies and Knowledge

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Disrupting surveillance: critical software design-led practice to obfuscate and reveal surveillance economies and knowledge monopolies. Hadi Mehrpouya Thesis submitted to the Degree of Doctor of Philosophy The University of Edinburgh Edinburgh College of Art 2021 1 | P a g e 2 | P a g e 4 | P a g e PhD Abstract Big data collection, behavioural economics and targeted advertisement are changing the dynamics and notions of our individuality and societies. By mobilising critical design methods, I made a series of critical design works to reveal and disrupt surveillance and knowledge monopolies. The aim of this practice-led investigation is to challenge surveillance and knowledge practices within internet search and advertising industries and through this contribute to surveillance debates and critical design practice. The four critical design practices that I developed during the course of this investigation namely Zaytoun, Philodox, Maladox and Open Bubble all interrogate humans’ relations to technology and more specifically their transformations as objects and subjects of surveillance capitalism. Zaytoun challenges notions of data consumption, quantification and distancing. Philodox reveals and critiques some trust issues and algorithmic biases of internet search engines. Maladox, is an anatomical engine of fictional speculative cyborg dis-eases, creating a critical space to reconsider our relationship to technology. Finally, Open Bubble is a counter surveillance browser extension that obfuscates and challenges knowledge enclosures imposed by search engines. Based on a review of philosophy of technology and especially as it relates to Science and Technology Studies (STS), I reflect on some of the underlying conditions that made possible the existence of modern technology in its current form. I analyse the contextual background of this body of work and its take on technology as a central lever for governance and for shaping of human subjects. This thesis investigates the taken for granted ways our interactions with surveillance capitalism infrastructures are transforming our individual and collective beings and in turn the new cyborg ontologies that we are being integrated into. The four critical design works included in this investigation offer alternative possibilities for critical engagement with, and interpretation of, big data and the algorithmic manipulations we are subjected to. This thesis attempts to take the below contributions to the theoretical developments around governmentality, surveillance capitalism, but also to critical design and design informatics. I develop ideas aiming at moving from humans and subjectivity as the nexus for governance towards attention to the cyborg as the emerging central 5 | P a g e site for both governance and resistance. Furthermore, through my practices I illustrate the importance of non-visual relations to audiences be it through touch or hearing in opening up spaces for questioning and resistance. I believe attention to the sensory dynamics of the experience and resistance have strong potentials for contributing to the debates around resistance within governance regimes. Furthermore, this thesis brings attention to the micro processes & software codes and algorithms that enable surveillance capitalism and engages in exercises aiming at disrupting them. I believe such detailed work focused on the ways humans interact with internet-based regimes of surveillance is a much-needed complement to the already well-developed critiques of institutions and structures of surveillance capitalism. Concerning critical design, my works bring attention to the role of spatial configuration of the works in conditioning the users’ rhythm, intensity and span of engagement with the work. In addition, I believe my practices and my theoretical developments around them open possibilities for new reflections on different forms of satire and laughter and how they can be situated in users’ experiences with critical design work. 6 | P a g e 7 | P a g e Lay summary Science and technology whilst having brought many opportunities and positive developments into our lives, they have also created many challenges that both us and the future generations face. For example climate change, threats against our democracy, human rights, privacy and liberty, but also societal challenges such as increasing inequalities and injustices. These challenges are not because of science and technology, but because of the ways, we understand, develop and use them. The boundary between science and technology have become blurry, because they reinforce and shape each other. Our world is immersed in science and technology, this includes how we access the news, find jobs, socialise, entertain, capture special moments of our lives, our manufacturing industries and how we organise and automate them; these are all one way or another managed and developed through science and technology. This means it is almost impossible to see our lives and our relationships with science and technology with sufficient distance. They are increasingly ubiquitous and taken for granted. One of the important aspects of technology is its ability to record and monitor our interactions with it. For example, when we visit anything on the internet, the websites will remember what we looked at, when, from which location, the device we used and many more. Over the past two decades, capitalism has developed new ways to make profit out of this data that technologies capture about our lives. Governments also use this to monitor and in some cases manipulate their citizens for both good and bad reasons. These approaches have led to further control of our access to knowledge but also control of our behaviours resulting in a new form of capitalism commonly referred to as surveillance capitalism. In this investigation, I developed four critical design projects to reveal, challenge and disrupt certain aspects of surveillance capitalism and to create a space for reflection and interpretation of these technological constructs. The four critical design practices that I developed are; Zaytoun, Philodox, Maladox and Open Bubble. They all question our relationship with technology and it’s effects on us. Zaytoun challenges how we consume information and how our lives are managed by numbers. Philodox examines how we blindly trust internet search 8 | P a g e engines. Maladox, is a fictional work that imagines future diseases created by the fusion of technology and us. Finally, Open Bubble is an anti-surveillance browser extension. 9 | P a g e 10 | P a g e Acknowledgments I would like to acknowledge the people who have supported me throughout my PhD and who have helped so much to make this possible. I am extremely grateful to each one of you. First of all thank you to my supervisors and friends, Chris Speed and Craig Martin, for guiding me throughout the process and for always being open to change and redirection over the years. Thank you also to my colleagues at Abertay University, especially my manager Ruth Falconer, for always being so understanding and supportive. I would also like to thank my family and wonderful friends for all of your love and support. Thank you especially to Paul Philips, Jacob Dobson, Laura Mehrpouya, Robert Powell and Diego Zamora for reading and commenting on my work and to Jerem Bretin for distracting me from the stress. Thank you to Sophie and Cora. You were born into a PhD whirlwind and, with mummy’s help; you have given me so much energy and inspiration. So much thanks to my Mum and Dad for giving me such a lot of love and encouragement throughout my education and for supporting me to move to Scotland and pursue my passions here. I am especially grateful to my brother Afshin, for your unending support and guidance with this project and beyond. I could not have completed this project without you. Thank you to Richard Shilcock for all the Marxist talks and conversations and being always available. Thank you to Simon Biggs for giving me my first academic job at University of Edinburgh, supporting me and guiding me in the beginning of my journey to becoming a researcher, for introducing me to many inspiring people at the University including my supervisor Chris. Thank you to Chris for all the research opportunities you gave me. 11 | P a g e Contents Declaration page...................................................................................................... 3 PhD Abstract ........................................................................................................... 5 Lay summary ........................................................................................................... 8 Acknowledgments ...................................................................................................11 Table of Figures ......................................................................................................17 Chapter 1. Introduction ...........................................................................................20 1.1 What we already know ..................................................................................20 1.2 Know to knot know or critical design as an affective endeavour ....................25 1.3 My journey back home or Odyssey and I .......................................................27 1.4 The layout of the rest of my thesis .................................................................28 Chapter 2. Governmentality: surveillance and capitalism ........................................32
Recommended publications
  • Firefox Quantum Remove Recommended by Pocket From

    Firefox Quantum Remove Recommended by Pocket From

    Firefox Quantum Remove Recommended By Pocket From Lamellar Gary restitutes: he ligatured his recognisance bearishly and dully. Desireless Redford suburbanized very monotonously while Silvester remains dysteleological and unconfined. Skin-deep Algernon never dislodged so westerly or stanchion any floppiness war. Stack traces are now shown for exceptions inside your console. Press to restore system options as which process starts it'll remove by the jailbreak. It is enabled by default in development versions of Firefox, but average in release versions. We have always bear the result in scratchpad and by pocket. Earn an issue that ff is by firefox quantum. You for tweetdeck, or login to network failures due to open source ip address bar at your activity. Ask a question and give support. Who cares about the features? 2012 after Mozilla detected a security flaw and recommended downgrading to. Access the feature for android firefox remove by now called extensions available for recommended by ad blockers work unencumbered by ad is a set to. This will open large number of your browser extensions that pisses me of money if you can either automatically updated their next app integrated into detail of. Dec 01 2017 Firefox Quantum's interface is still extremely customizable thanks to. Where is the back latch on Firefox? Mozilla Firefox or simply Firefox is that free quote open-source web browser developed by the. It will not collect data in private browser windows, and when Mozilla shares the results of its research, it will do so in a way that minimizes the risk of users being identified, Boyd said.
  • Title Pub Date Note Abstract

    Title Pub Date Note Abstract

    DOCUMENT RESUME ED 366 244 HE 027 085 TITLE 20 Years: Putting It All Together. Proceedings of the Annual Conference of the North East Association for Institutional Research (20th, Bolton Landing, New York, November 6-9, 1993). INSTITUTION North East Association for InsC'utional Research. PUB DATE Nov 93 NOTE 337p. PUB TYPE Collected Works Conference Proceedings (021) EDRS PRICE MF01/PC14 Plus Postage. DESCRIPTORS Alumni; *College Administration; College Freshmen; Crime; Data; *Data Analysis; Demography; Educational Finance; Electronic Mail; Enrollment Trends; Federal Aid; Financial Exigency; *Higher Education; Institutional Mission; *Institutional Research; Outreach Programs; Program Evaluation; *Research Methodology; School Holding Power; Sex Differences; Teacher Salaries; Telecommunications IDENTIFIERS Internet; Suffolk County Community College NY ABSTRACT This report of the proceedings of a conference on institutional research techniques contains information on the conference and 23 selected papers. Conference information includes the program, a list of steering committee members, and a list of attenders. The following papers are included:(1) "Examples of How Institutional Research Can Help Campus Administrators with Their Survey Research Needs" (Karen W. Bauer) ;(2) "No Pain, No Gain: How One College Emerged Stronger from the Fiscal Crisis" (Craig A. Clagett);(3) "Outreach Programs and Their Varying Impact on Key Market Segments" (David J. Costello) ;(4) "Analytical Techniques for Studying Student Retention" (Anne Marie Delaney);(5) "Designing Alumni Research for Assessment and Planning" (Anne Marie Delaney); (6) "Beyond E-mail: Getting Data from the Internet" (Jim Fergerson); (7)"To Have and To Hold: On the Meaning of 'Retention" (Thomas B. Flaherty and Jennifer A. Brown) ;(8) "Making the Most of the Mission Review: A Topical Case Study" (Eleanor Fujita and Mark Oromaner); (9) "A Review of Reliability, Validity and Useability Considerations in the Use of the Writing Sample as an Index of Program Effect" (Stanley S.
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet

    The People Who Invented the Internet Source: Wikipedia's History of the Internet

    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
  • Before the Web There Was Gopher

    Before the Web There Was Gopher

    Before the Web There Was Gopher Philip L. Frana Charles Babbage Institute The World Wide Web, universally well known today, was preceded by an efficient software tool that was fondly named Gopher. The Internet Gopher, much like the Web, enabled users to obtain information quickly and easily. Why, then, did it disappear but the Web did not? Gopher faded into obscurity for two main reasons: hypertext and commerce. Before the Web there was Gopher, a nearly anymore, despite the efforts of a handful of defunct Internet application protocol and asso- individuals to revitalize the protocol. Why did ciated client and server software.1 In the early Gopher fail? Many Gopher aficionados have a 1990s, Gopher burrowed a crucial path ready answer: pretty pictures. For them, the through a perceived bottleneck on the Web won and Gopher lost because the Web Information Superhighway. Internet Gopher could display vibrant images of, for example, passed away as a technological and social phe- hand-woven Turkish rugs, animated glyphs of nomenon quickly: Its inventors released mice stuffing email into virtual mailboxes, and Gopher in 1991. Within three years, the World blinking advertising banners. Clearly, the Wide Web had bypassed it. Most people who “Gopher faithful”—as they are often called— surf the Web today have no idea what Gopher are right about the importance of pictures. is, but in the 1990s it helped usher in a new age People get serious when money is at stake, and of user-friendly access to a rapidly growing uni- in the early 1990s lots of people came to accept verse of online information.
  • Browsing the Internet Worksheet Synopsis

    Browsing the Internet Worksheet Synopsis

    CLASS : 4 SUBJECT : COMPUTER SCIENCE TOPIC : BROWSING THE INTERNET WORKSHEET SYNOPSIS: The World Wide Web (WWW) is a huge collection of pages. The World Wide Web is popularly known as the Web. Moving from one website to another is known as net surfing or web browsing. A hyperlink is a highlighted text or graphic image on a web page that we can click to jump to another location. A website that provides the facility of searching for information on various topics are known as search engines. For example - Google, Bing, Yahoo Search etc. The first search engine was named Archie. Veronica and Jughead are the search tools. These three are well-known comic characters. There are many tips to make our search effective on the Internet. We must spell the words correctly. We should know what we are looking for and be specific. Use double quotation marks around search words. This will tell the search engine that the words in quotes must be searched exactly as they are typed, and in the same order. We can put a plus sign (+) instead of AND and a a minus sign (-) instead of OR. I. Fill in the blanks: a) ___________ is a highlighted word or graphic image. b) The first page of a website is called the _______ page. c) The WWW stands for _________ __________ _________. d) The WWW is popularly known as the _________. e) ________ , _________ and _________ are popular search engines. f) ________ was the first search engine. II. State whether the following statements are True or False: a) We can spell the search words incorrectly.
  • Global and Cultural Studies

    Global and Cultural Studies

    Wright State University CORE Scholar Books Authored by Wright State Faculty/Staff 2017 Global and Cultural Studies Ronald G. Helms Ph.D. Wright State University - Main Campus, [email protected] Follow this and additional works at: https://corescholar.libraries.wright.edu/books Part of the Education Commons Repository Citation Helms , R. G. (2017). Global and Cultural Studies. Arlington, TX: Franklin Publishing Company. This Book is brought to you for free and open access by CORE Scholar. It has been accepted for inclusion in Books Authored by Wright State Faculty/Staff by an authorized administrator of CORE Scholar. For more information, please contact [email protected]. Global and Cultural Studies Ronald G. Helms, Ph.D. 1 Global and Cultural Studies Ronald G. Helms, Ph.D. Global and Cultural Studies 2 Ronald G. Helms, Ph.D. Published by Franklin Publishing Company 2723 Steamboat Cir, Arlington, TX 76006 Copyright © by Dr. Ronald G. Helms 2017 The Author Ronald G. Helms is a full professor of Social Studies Education and Global Studies, a national auditor for NCSS_National Council For Accreditation Of Teacher Education Program Reviews, a former member of National Council For Accreditation Of Teacher Education Board of Examiners, National Board for Professional Teacher Standards facilitator, the Principal Investigator at Wright State University for the NBPTS institute; Helms is the recipient of 45+ grants including a $916,000.00 Teaching American History Grant from the U. S. Department of Education (co-author and/or consultant to six Teaching American History Grants. Helms is active with OCSS and NCSS for the past 49 years, and currently is serving on the NCSS Teacher of the Year Committee and the NCSS/NCATE Program Review Committee.
  • Reversing Malware [Based on Material from the Textbook]

    Reversing Malware [Based on Material from the Textbook]

    SoftWindows 11/23/05 Reversing Malware [based on material from the textbook] Reverse Engineering (Reversing Malware) © SERG What is Malware? • Malware (malicious software) is any program that works against the interest of the system’s user or owner. • Question: Is a program that spies on the web browsing habits of the employees of a company considered malware? • What if the CEO authorized the installation of the spying program? Reverse Engineering (Reversing Malware) © SERG Reversing Malware • Revering is the strongest weapon we have against the creators of malware. • Antivirus researchers engage in reversing in order to: – analyze the latest malware, – determine how dangerous the malware is, – learn the weaknesses of malware so that effective antivirus programs can be developed. Reverse Engineering (Reversing Malware) © SERG Distributed Objects 1 SoftWindows 11/23/05 Uses of Malware • Why do people develop and deploy malware? – Financial gain – Psychological urges and childish desires to “beat the system”. – Access private data – … Reverse Engineering (Reversing Malware) © SERG Typical Purposes of Malware • Backdoor access: – Attacker gains unlimited access to the machine. • Denial-of-service (DoS) attacks: – Infect a huge number of machines to try simultaneously to connect to a target server in hope of overwhelming it and making it crash. • Vandalism: – E.g., defacing a web site. • Resource Theft: – E.g., stealing other user’s computing and network resources, such as using your neighbors’ Wireless Network. • Information Theft: – E.g., stealing other user’s credit card numbers. Reverse Engineering (Reversing Malware) © SERG Types of Malware • Viruses • Worms • Trojan Horses • Backdoors • Mobile code • Adware • Sticky software Reverse Engineering (Reversing Malware) © SERG Distributed Objects 2 SoftWindows 11/23/05 Viruses • Viruses are self-replicating programs that usually have a malicious intent.
  • Topics in Malware What Is Malware?

    Topics in Malware What Is Malware?

    Topics in Malware What is Malware? • Malware (malicious software) is any program that works against the interest of the system’s user or owner. • Question: Is a program that spies on the web browsing habits of the employees of a company considered malware? • What if the CEO authorized the installation of the spying program? Uses of Malware • Why do people develop and deploy malware? – Financial gain – Psychological urges and childish desires to “beat the system”. – Access private data – … Typical purposes of Malware • Backdoor access: – Attacker gains unlimited access to the machine. • Denial-of-service (DoS) attacks: – Infect a huge number of machines to try simultaneously to connect to a target server in hope of overwhelming it and making it crash. • Vandalism: – E.g., defacing a web site. • Resource Theft: – E.g., stealing other user’s computing and network resources, such as using your neighbors’ Wireless Network. • Information Theft: – E.g., stealing other user’s credit card numbers. Types of Malware • Viruses • Worms • Trojan Horses • Backdoors • Mobile code • Adware • Sticky software Metamorphic viruses • Instead of encrypting the program’s body and making slight alterations in the decryption engine, alter the entire program each time it is replicated. • This makes it extremely difficult for antivirus writers to use signature-matching techniques to identify malware. • Metamorphism requires a powerful code analysis engine that needs to be embedded into the malware. Metamorphic viruses: Operation • Metamorphic engine scans the code and generates a different version of it every time the program is duplicated. • The metamorphic engine performs a wide variety of transformations on the malware and on the engine itself.
  • TCP SYN-ACK) to Spoofed IP Addresses

    TCP SYN-ACK) to Spoofed IP Addresses

    Joint Japan-India Workshop on Cyber Security and Services/Applications for M2M and Fourteenth GISFI Standardization Series Meeting How to secure the network - Darknet based cyber-security technologies for global monitoring and analysis Koji NAKAO Research Executive Director, Distinguished Researcher, NICT Information Security Fellow, KDDI Outline of NICT Mission As the sole national research institute in the information and communications field, we as NICT will strive to advance national technologies and contribute to national policies in the field, by promoting our own research and development and by cooperating with and supporting outside parties. Collaboration between Industry, Academic Institutions and Government R&D carried out by NICT’s researchers Budget (FY 2012): approx. 31.45 Billion Yen (420 Million US$) Personnel: 849 Researchers: 517 PhDs: 410 R&D assistance (as of April 2012) to industry and life convenient Japan Standard Time and academia Space Weather Forecast services Forecast Weather Space of the global community community global the of Growth of Economy of Japanese Growth Promotion of ICT a more for Security and Safety businesses Interaction with National ICT Policy problems major solve to Contribution 2 Internet Security Days 2012 Network Security Research Institute Collabor • Cyber attack monitoring, tracking, • Dynamic and optimal deployment of ation security functions analysis, response and prevention New GenerationNetwork Security • Prompt promotion of outcomes • Secure new generation network design Security Cybersecurity Architecture Laboratory Security Organizations Laboratory Daisuke Inoue Shin’ichiro Matsuo Kazumasa Taira Koji Nakao (Director General) (Distinguished Researcher) Security • Security evaluation of cryptography Fundamentals • Practical security • Post quantum cryptography Laboratory • Quantum security Shiho Moriai Recommendations for Cryptographic Algorithms and Key Lengths to Japan e-Government and SDOs 3 Internet Security Days 2012 Content for Today • Current Security Threats (e.g.
  • Understanding the Performance Costs and Benefits of Privacy-Focused

    Understanding the Performance Costs and Benefits of Privacy-Focused

    Understanding the Performance Costs and Benefits of Privacy-focused Browser Extensions Kevin Borgolte Nick Feamster [email protected] [email protected] Princeton University University of Chicago ABSTRACT 1 INTRODUCTION Advertisements and behavioral tracking have become an invasive The online advertisement (ad) industry has been one of the fastest nuisance on the Internet in recent years. Indeed, privacy advocates growing industries in the recent years, growing from over 108 and expert users consider the invasion signifcant enough to war- billion US dollars in 2018 to an estimated 129 billion US dollars rant the use of ad blockers and anti-tracking browser extensions. in 2019 in the United States [34], and to estimated 333 billion US At the same time, one of the largest advertisement companies in dollars in 2019 globally [12]. This growth has sparked numerous the world, Google, is developing the most popular browser, Google academic studies of various angles of online ads, from understand- Chrome. This confict of interest, that is developing a browser (a ing the underlying economics, the overall scale of it, mechanisms user agent) and being fnancially motivated to track users’ online and techniques used, as well as how miscreants are abusing it to behavior, possibly violating their privacy expectations, while claim- proft. ing to be a "user agent," did not remain unnoticed. As a matter of Academic and industry studies on the techniques that online fact, Google recently sparked an outrage when proposing changes ads are relying on have led to privacy advocates and expert users to Chrome how extensions can inspect and modify requests to "im- arguing that the ad companies’ tracking and data collection, which prove extension performance and privacy," which would render provides the foundation for the most prevalent online ads today, existing privacy-focused extensions inoperable.
  • Blocked by Content Security Policy Firefox Disable

    Blocked by Content Security Policy Firefox Disable

    Blocked By Content Security Policy Firefox Disable Profanatory Addie engrain his personation hap imperturbably. Despised and epistemic Webb interjaculates her Cotopaxi reimplants quiescently or maltreats lifelessly, is Quiggly negative? Truffled and daft Noach dwelled some dan so aboard! Working of your policy directives and hpkp supercookies, who want to know your blocked by content security policy based on the policy Content Security Policy value it. We help businesses of all sizes harness the potential of Cloud Technologies by providing the blueprint, a talented service delivery team and special care care support. This preference controls access to content policy block to be enabled by. Related resources Refer the these guides for writing CSPs that appear compatible for various browsers Mozilla W3C Chrome CSP extensions. He now specializes in online marketing and content writing conversation is cable of original Content Marketing Team at GreenGeeks. You can try again this by the tab or browser for privacy in firefox may supersede this will now also advise about this is the lack of. Discover what your Privacy Policy should look like with GDPR in mind. Which has shipped in Firefox since our initial implementation of CSP. Why Google Chrome is so good? But I get kicked out a lot especially from dating sites and I have tried a lot of things to hide my true location or change my location to the region the site allows access to but nothing works. By default, Firebox blocks pages that mix secure and insecure content. The Mixed Content Blocker blocks certain HTTP requests on HTTPS pages. Also see Block access allow pop-ups in Chrome from Google Chrome Help.
  • Internet Privacy Implications Research and Draft

    Internet Privacy Implications Research and Draft

    Internet Privacy Implications A Major Qualifying Project Worcester Polytechnic Institute Submitted to the Faculty of the Worcester Polytechnic Institute in partial fulfillment of the requirements for the Degree of Bachelor of Science. Submitted By: Goncharova, Masha Harnois, Jeffrey Advisors: Wills, Craig PhD Doyle, James PhD May 6, 2021 Abstract Our research focused on understanding the effectiveness of browsers, extensions, mobile applications, and search engines and their protection of user privacy. We ran test cases on the top 100 Alexa sites, using a Fiddler proxy to capture traffic, with certain configurations of tools mentioned to see which ones were efficient in blocking user tracking technologies. We found that Brave and Firefox in Strict mode are the best browsers in terms of tradeoff between percent of websites with degradation versus percent trackers remaining. uBlock Origin, Ghostery and Privacy Badger are the best browser extensions in terms of the same tradeoff. Based on our results, we created a recommendation system using a survey approach. We suggest a combination of tools that are personalized to users based on their reported privacy preferences and desire to switch their current browsing setup. In order to better understand users’ views on privacy, we additionally showed participants their own data Google has synthesized about them to evaluate if that would change their responses. A ceiling effect appeared in our responses, indicating that no matter the condition, all our participants indicated a willingness to switch to the tools that we were recommending. 1 Table of Contents Abstract 1 Table of Contents 2 List of Tables 6 List of Figures 7 Double Major Note 9 1.