General Characteristics of Android Browsers with Focus on Security and Privacy Features

Total Page:16

File Type:pdf, Size:1020Kb

General Characteristics of Android Browsers with Focus on Security and Privacy Features BÁNKI KÖZLEMÉNYEK 3. ÉVFOLYAM 1. SZÁM General characteristics of Android browsers with focus on security and privacy features Petar Čisar*, Sanja Maravic Cisar**, Igor Fürstner*** Academy of Criminalistic and Police Studies, Belgrade, Serbia, **Subotica Tech, Subotica, Serbia, ***Óbuda University, Bánki Donát Faculty of Mechanical and Safety Engineering, Budapest, Hungary, [email protected], [email protected], [email protected] • Incognito browsing mode - offers real private Abstract —Satisfactory level of security in the use of the browsing experience without leaving any historical Internet in mobile devices depends on several factors. One of data. them is safe browsing. A key factor in providing secure • Using of HTTPS protocol - enforces SSL (Secure browsing is the application of a browser with the appropriate Socket Layer) security protocol (using of certificates) methods applied: clearing cookies, cache and history, ability wherever that’s possible. of incognito browsing, using of whitelists and encryptions and others. This paper presents an overview of the various • Disabling features like JavaScript, DOM (Document security and privacy features used in the most frequently Object Model) storage used Android browsers. Also, in the case of several browsers • Using fingerprinting techniques and types of mobile devices, the use of benchmark tests is Further sections of this paper provide an overview of the shown. Bearing in mind the differences, when choosing a applied security and privacy methods for more popular browser, special attention should be paid to the applied Android browsers. Also, in order to compare the adequate security and privacy features. features of browsers, the use of benchmark tests on different mobile devices will be shown. Keywords: Android browser, security, adblock, tracking, encryption, benchmark test 2 SECURITY AND PRIVACY FEATURES OF DIFFERENT ANDROID BROWSERS 1 INTRODUCTION This chapter provides an overview of most important The increased use of mobile devices to store large security features of a large number of popular Android amounts of data also carries a risk of loss or theft, which browsers. can compromise the security of information. In order to minimize the risks of such abuses, mobile and wireless Ghostery [9] users need to be aware of security issues relating to the • Provides an instant overview of the trackers on each technology [1]. One of the factors that significantly affects visited site, then block or allow them. the level of security in the use of mobile devices is browser • Manage website whitelists. [2]-[4]. Safe browsing concept protects users against • Largest tracker database - with over 2200 trackers and Internet security threats by allowing applications to check 4500 scripts. URLs against lists of unsafe web resources, such as social engineering sites (phishing and deceptive sites), and sites • Additional privacy options with quick and easy access that host PHAs (Potentially Harmful Applications) or to clear cookies, cache, and granular history. unwanted software. When users attempt to visit an unsafe Dolphin Zero [10] web resource, their safe browsing-supported browser • Adblock is one of the best adblock-browser. displays a warning. There are a large number of browsers • Incognito browsing. on the market with very different security features. Before installing one of them, it is useful to first know their • Clean UI (user interface) and fast navigation - user can capabilities and compare them with each other [5]-[8]. add most visited websites as speed dial icons with a friendly UI and one-touch access. Android browsers use different security features (general overview): That includes theming (theming consists of changing the user interface without changing the application logic), • Using website whitelists - list of items (e-mail flash support, ad-block, incognito mode, and some tertiary addresses or domain names) from which a blocking features like gesture controls. There is also optional add- program (spam filter) will allow messages to be on and extension support. received. When a whitelist is used, all entities are denied access, except those included in the whitelist. Firefox Focus [11] • Blocks a wide range of common Web trackers without • Possibility of clearing cookies, cache, and granular any settings to set. history (no passwords, no cookies, no trackers). • Erases user's history. • Blocking or allowing trackers. • By removing trackers and ads, Web pages may require • Adblocker - user can block pop-ups, advertisements, fewer data and load faster. banners & ad-videos. ©The author(s). Open access is under the terms of the Creative Commons Attribution Non-Commercial No 30 Derivatives 4.0 International Licence. Čisar, P., Cisar, S. M., Fürstner, I.(2020): General characteristics of Android... Bánki Közlemények 3(1), 30-35. This is a security-focused browser application. • Password protected - Prevent any snooping on recent Basically, every session is in privacy mode. Some features browsing activity, even if it is still active in recently include a one-tap history deletion process, a fairly decent opened applications. Only the user can open the ad-block, and it blocks most types of web trackers. browser. Firefox [12] CM Secure [17] Private browsing mode with added tracking protection - • Fraud prevention - Warns when browsing potentially stops ads that track and follow user around the Internet. fraudulent or malicious websites. Browsing history will not be remembered or cookies saved • Malicious download protection - Scans apk file after the action. downloads for malware, keeping the device secure. Frost Incognito Browser [13] • User agent - Supports user agent switching to access • Tabbed browsing - Fast, full featured tabbed browser desktop sites. with HTML 5 video support, popup blocker, and user agent switching. Chrome [18] • Privacy – use incognito mode to browse without • Ad blocking - Built in ad blocker speeds up page saving the history. loading and reduces data usage. • Do Not Track feature - Chrome will automatically • Privacy protection - Automatically clears all browsing send a Do Not Track request with the browsing traffic. history when closing the application. • Safe browsing technology - showing a warning on • Image & bookmark vault - Download images from the screen if user tries and navigates to a page which it web and save bookmarks into a hidden, password deems to be unsafe. protected vault. • Autofill and payments - Given it pre-populates • Import & export images - Import or export pictures addresses and credit card details on applications and between device storage and image vault. websites, someone with access to user's phone could • Complete stealth - Frost looks and functions like any not only steal his identity but also rack up a significant other normal browser, until user enter his password amount of spending before he realize something is into the address bar, which reveals image and wrong. bookmark vaults. • Setting of site permissions • Vault protection - The contents of vaults is hidden • Managing user's syncing options from other applications (for instance, gallery or camera) and not viewable when connected to a • Disabling sending of (security) reports to Google computer. • Disabling prediction services (suggestion of search Privacy Browser [14] terms and websites) This browser protects the privacy by disabling features InBrowser [19] like JavaScript, DOM (Document Object Model) storage, • No data is saved. and cookies that are used by websites to track users. • TOR support via Orbot. Settings can be adjusted by domain and on-the-fly to enable these features when needed. In addition, the • Supports agent cloaking (no more mobile version of browser incorporates the EasyList block lists, which block sites). many tracking technologies even when JavaScript is • Deep integration with LastPass. enabled. Asus Browser [20] Security and privacy features: • Lightning speeds - ASUS Browser runs on leading • TOR (The Onion Router) Orbot proxy support Chrome-based engine to load web pages rapidly. • SSL certificate pinning • Adapts to a region - The Navigation panel displays the • Full screen browsing mode popular websites according to user's location. • Night mode • Secure Browsing - Built-in security features protect from malware and phishing sites. Krypton [15] • Do-It-Later - Mark pages as a task to be read later • Privacy - History, cookies and site data are never when convenient. stored on disk, and never transmitted. • Import bookmarks - Import saved pages in Google • Security - Each tab is isolated in a separate OS Chrome to user's browser. process. Every tab is treated as a distinct instance, with its own memory storage and state. Puffin [21] • Anonymity - Enable TOR with a single tap to hide the • Puffin speeds up mobile browsing by shifting the IP, avoid surveillance, and circumvent censorship. workload from the resource-limited devices to the Includes HTTPS Everywhere (enforces SSL security cloud servers. wherever that’s possible), and mitigates common • It’s safe to use public non-secure WiFi through Puffin, fingerprinting techniques. but not safe at all for most browsers. Javelin [16] • Puffin uses a proprietary compression algorithm to • Ad block - web browsing with no ads. transmit web data to device, and it can save up to 90% of bandwidth on regular web browsing. • Always incognito - The web history is never saved, and cookies are always deleted. No one needs to know Brave [22] someone's surfing habits.
Recommended publications
  • Product ID Product Type Product Description Notes Price (USD) Weight (KG) SKU 10534 Mobile-Phone Apple Iphone 4S 8GB White 226.8
    Rm A1,10/F, Shun Luen Factory Building, 86 Tokwawan Road, Hong Kong TEL: +852 2325 1867 FAX: +852 23251689 Website: http://www.ac-electronic.com/ For products not in our pricelist, please contact our sales. 29/8/2015 Product Price Weight Product Type Product Description Notes SKU ID (USD) (KG) 10534 mobile-phone Apple iPhone 4S 8GB White 226.8 0.5 40599 10491 mobile-phone Apple iPhone 5s 16GB Black Slate 486.4 0.5 40557 10497 mobile-phone Apple iPhone 5s 16GB Gold 495.6 0.5 40563 10494 mobile-phone Apple iPhone 5s 16GB White Silver 487.7 0.5 40560 10498 mobile-phone Apple iPhone 5s 32GB Gold 536.3 0.5 40564 11941 mobile-phone Apple iPhone 6 128GB Gold 784.1 0.5 41970 11939 mobile-phone Apple iPhone 6 16GB Gold 622.8 0.5 41968 11936 mobile-phone Apple iPhone 6 16GB Silver 633.3 0.5 41965 11942 mobile-phone Apple iPhone 6 16GB Space Grey 618.9 0.5 41971 11940 mobile-phone Apple iPhone 6 64GB Gold 705.4 0.5 41969 11937 mobile-phone Apple iPhone 6 64GB Silver 706.7 0.5 41966 11943 mobile-phone Apple iPhone 6 64GB Space Grey 708 0.5 41972 11963 mobile-phone Apple iPhone 6 Plus 128GB Silver 917.9 1 41991 11955 mobile-phone Apple iPhone 6 Plus 16GB Gold 755.3 1 41983 11961 mobile-phone Apple iPhone 6 Plus 16GB Silver 731.6 1 41989 11958 mobile-phone Apple iPhone 6 Plus 16GB Space Grey 735.6 1 41986 11956 mobile-phone Apple iPhone 6 Plus 64GB Gold 843.1 1 41984 11962 mobile-phone Apple iPhone 6 Plus 64GB Silver 841.8 1 41990 11959 mobile-phone Apple iPhone 6 Plus 64GB Space Grey 840.5 1 41987 12733 mobile-phone ASUS ZenFone 2 ZE550ML Dual SIM
    [Show full text]
  • Android Firefox Remove Recommendations by Pocket
    Android Firefox Remove Recommendations By Pocket Ramiform Win usually overate some deoxyribose or hepatising divergently. Biannual Mikel pulp nor'-west or conglobating suppositionally when Percy is unofficial. Is Washington always stenotropic and dimensional when mantle some ventilation very seventhly and reflectively? Google Mail Checker is extension for chrome to know the status of the number of unread messages in Google Mail inbox. If you choose to upgrade, Pocket will create a permanent copy of everything in your library. University of North Carolina shuts down athletic programs through Thursday. This is particularly surprising since it was Firefox that made browser extensions mainstream. Not all VPNs have an extension for Firefox though, and some of them work differently. When I launched App Center, it just brought up a small Live Update screen, then listed a BIOS update, so I clicked that, it installed, and restarted. When you open a new tab, Pocket recommends a list of articles based on the most popular items saved that day. The next command should remove two directories. While the Safari browser does come standard on all Apple devices able to connect to the internet, an update might be needed every once in awhile. Instead, it basically learns as you use it. When it easy and remove firefox recommendations by pocket considers to emulate various changes. Then, click Save to save your changes. And the respect is just as prevalent as the accolades and ability. Change the mode from Novice to Advanced. Vysor puts your Android on your desktop. It can download and organize files, torrents and video in fast mode.
    [Show full text]
  • A Usability Evaluation of Privacy Add-Ons for Web Browsers
    A Usability Evaluation of Privacy Add-ons for Web Browsers Matthew Corner1, Huseyin Dogan1, Alexios Mylonas1 and Francis Djabri2 1 Bournemouth University, Bournemouth, United Kingdom {i7241812,hdogan,amylonas}@bournemouth.ac.uk 2 Mozilla Corporation, San Francisco, United States of America [email protected] Abstract. The web has improved our life and has provided us with more oppor- tunities to access information and do business. Nonetheless, due to the preva- lence of trackers on websites, web users might be subject to profiling while ac- cessing the web, which impairs their online privacy. Privacy browser add-ons, such as DuckDuckGo Privacy Essentials, Ghostery and Privacy Badger, extend the privacy protection that the browsers offer by default, by identifying and blocking trackers. However, the work that focuses on the usability of the priva- cy add-ons, as well as the users’ awareness, feelings, and thoughts towards them, is rather limited. In this work, we conducted usability evaluations by uti- lising System Usability Scale and Think-Aloud Protocol on three popular priva- cy add-ons, i.e., DuckDuckGo Privacy Essentials, Ghostery and Privacy Badg- er. Our work also provides insights into the users’ awareness of online privacy and attitudes towards the abovementioned privacy add-ons; in particular trust, concern, and control. Our results suggest that the participants feel safer and trusting of their respective add-on. It also uncovers areas for add-on improve- ment, such as a more visible toolbar logo that offers visual feedback, easy ac- cess to thorough help resources, and detailed information on the trackers that have been found. Keywords: Usability, Privacy, Browser Add-ons.
    [Show full text]
  • Samsung Galaxy J5 J530F(2017) Duos 16GB Gold
    Samsung Galaxy J5 J530F(2017) Duos 16GB Gold Samsung Galaxy J5 (2017) SM-J530F. Bildschirmdiagonale: 13,2 cm (5.2 Zoll), Bildschirmauflösung: 1280 x 720 Pixel, Display-Typ: SAMOLED. Prozessor-Taktfrequenz: 1,6 GHz. RAM-Kapazität: 2 GB, Interne Speicherkapazität: 16 GB. Auflösung Rückkamera: 13 MP, Rückkameratyp: Einzelne Kamera. Sim Card Steckplätze: Dual SIM, 3G, 4G. Vorinstalliertes Betriebssystem: Android. Batteriekapazität: 3000 mAh. Produktfarbe: Gold. Gewicht: 160 g Artikel 374869 Herstellernummer SM-J530FZDDDBT EAN 8806088894775 Zusammenfassung 13.208 cm (5.2 ") 720 x 1280 Super AMOLED, GSM/UMTS/LTE, 1.6 GHz Octa-Core, RAM 2GB, 13.0 MP/13.0 MP, MicroSD, Wi-Fi, Bluetooth, NFC, Android Samsung Galaxy J5 (2017) SM-J530F, 13,2 cm (5.2 Zoll), 2 GB, 16 GB, 13 MP, Android, Gold Samsung Galaxy J5 (2017) SM-J530F. Bildschirmdiagonale: 13,2 cm (5.2 Zoll), Bildschirmauflösung: 1280 x 720 Pixel, Display-Typ: SAMOLED. Prozessor-Taktfrequenz: 1,6 GHz. RAM-Kapazität: 2 GB, Interne Speicherkapazität: 16 GB. Auflösung Rückkamera: 13 MP, Rückkameratyp: Einzelne Kamera. Sim Card Steckplätze: Dual SIM, 3G, 4G. Vorinstalliertes Betriebssystem: Android. Batteriekapazität: 3000 mAh. Produktfarbe: Gold. Gewicht: 160 g Beschreibung Natürliche Eleganz Stil trifft auf Funktionalität. Wir legen großen Wert auf Details, daher haben wir mit dem Galaxy J5 (2017) DUOS ein Smartphone geschaffen, das über ein Metallgehäuse verfügt, eine nicht hervorstehende Kamera und ein 13,18 cm / 5,2" HD Super AMOLED- Display hat. Teilen Sie Ihr Leben aus Ihrer Perspektive Die 13 MP-Hauptkamera mit f1.7-Blende schießt mit einem hohen Detailgrad, auch bei schlechten Lichtverhältnissen, hochauflösende Bilder. Für eine bequeme, einhändige Bedienung lässt sich die Kamera-Schaltfläche auf dem Display verschieben, sodass Sie jederzeit ein Foto schießen können - egal, ob Sie die richtige Pose oder den perfekten Hintergrund suchen.
    [Show full text]
  • Demystifying Content-Blockers: a Large-Scale Study of Actual Performance Gains
    Demystifying Content-blockers: A Large-scale Study of Actual Performance Gains Ismael Castell-Uroz Josep Sole-Pareta´ Pere Barlet-Ros Universitat Politecnica` de Catalunya Universitat Politecnica` de Catalunya Universitat Politecnica` de Catalunya Barcelona, Spain Barcelona, Spain Barcelona, Spain [email protected] [email protected] [email protected] Abstract—With the evolution of the online advertisement and highly parallel network measurement system [10] that loads tracking ecosystem, content-filtering has become the reference every website using one of the most relevant content-blockers tool for improving the security, privacy and browsing experience of each category and compares their performance. when surfing the Internet. It is also commonly believed that using content-blockers to stop unsolicited content decreases the time We found that, although we can observe some improvements needed for loading websites. In this work, we perform a large- in terms of effective page size, the results do not directly scale study with the 100K most popular websites on the actual translate to gains in loading time. In some cases, there could performance improvements of using content-blockers. We focus even be an overhead to be paid. This is the case for two of the our study on two relevant metrics for measuring the browsing studied plugins, especially in small and fast loading websites. performance; page size and loading time. Our results show that using such tools results in small improvements in terms of page The measurement system and methodology proposed in this size but, contrary to popular belief, it has a negligible impact in paper can also be useful for network and service administrators terms of loading time.
    [Show full text]
  • Private Browsing
    Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University https://www.usenix.org/conference/soups2018/presentation/habib-prying This paper is included in the Proceedings of the Fourteenth Symposium on Usable Privacy and Security. August 12–14, 2018 • Baltimore, MD, USA ISBN 978-1-939133-10-6 Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University {htq, jcolnago, vidyag, spearman, thomasjm, acquisti, nicolasc, lorrie}@andrew.cmu.edu ABSTRACT Prior user studies have examined different aspects of private Previous research has suggested that people use the private browsing, including contexts for using private browsing [4, browsing mode of their web browsers to conduct privacy- 10, 16, 28, 41], general misconceptions of how private brows- sensitive activities online, but have misconceptions about ing technically functions and the protections it offers [10,16], how it works and are likely to overestimate the protections and usability issues with private browsing interfaces [41,44]. it provides. To better understand how private browsing is A major limitation of much prior work is that it is based used and whether users are at risk, we analyzed browsing on self-reported survey data, which may not always be reli- data collected from over 450 participants of the Security able.
    [Show full text]
  • Google Nexus 6P (H1512) Google Nexus 7
    GPSMAP 276Cx Google Google Nexus 5X (H791) Google Nexus 6P (H1512) Google Nexus 7 Google Nexus 6 HTC HTC One (M7) HTC One (M9) HTC One (M10) HTC One (M8) HTC One (A9) HTC Butterfly S LG LG V10 H962 LG G3 Titan LG G5 H860 LG E988 Gpro LG G4 H815 Motorola Motorola RAZR M Motorola DROID Turbo Motorola Moto G (2st Gen) Motorola Droid MAXX Motorola Moto G (1st Gen) Samsung Samsung Galaxy Note 2 Samsung Galaxy S4 Active Samsung Galaxy S6 edge + (SM-G9287) Samsung Galaxy Note 3 Samsung Galaxy S5 Samsung Galaxy S7 edge (SM- G935FD) Samsung Galaxy Note 4 Samsung Galaxy S5 Active Samsung GALAXY J Samsung Galaxy Note 5 (SM- Samsung Galaxy S5 Mini Samsung Galaxy A5 Duos N9208) Samsung Galaxy S3 Samsung Galaxy S6 Samsung Galaxy A9 (SM- A9000) Samsung Galaxy S4 Sony Sony Ericsson Xperia Z Sony Xperia Z3 Sony Xperia X Sony Ericsson Xperia Z Ultra Sony Xperia Z3 Compact Sony XPERIA Z5 Sony Xperia Z2 Sony XPERIA E1 Asus ASUS Zenfone 2 ASUS Zenfone 5 ASUS Zenfone 6 Huawei HUAWEI P8 HUAWEI M100 HUAWEI P9 HUAWEI CRR_L09 XIAOMI XIAOMI 2S XIAOMI 3 XIAOMI 5 XIAOMI Note GPSMAP 64s Google Google Nexus 4 Google Nexus 6P (H1512) Google Pixel Google Nexus 6 Google Nexus 7 HTC HTC One (M7) HTC One (A9) HTC Butterfly S HTC One (M8) HTC One (M10) HTC U11 HTC One (M9) LG LG Flex LG E988 Gpro LG G5 H860 LG V10 H962 LG G4 H815 LG G6 H870 Motorola Motorola RAZR M Motorola DROID Turbo Motorola Moto G (2st Gen) Motorola Droid MAXX Motorola Moto G (1st Gen) Motorola Moto Z Samsung Samsung Galaxy Note 2 Samsung Galaxy S5 Samsung Galaxy J5 Samsung Galaxy Note 3 Samsung Galaxy
    [Show full text]
  • Whotracks. Me: Shedding Light on the Opaque World of Online Tracking
    WhoTracks.Me: Shedding light on the opaque world of online tracking Arjaldo Karaj Sam Macbeth Rémi Berson [email protected] [email protected] [email protected] Josep M. Pujol [email protected] Cliqz GmbH Arabellastraße 23 Munich, Germany ABSTRACT print users and their devices [25], and the extent to Online tracking has become of increasing concern in recent which these methods are being used across the web [5], years, however our understanding of its extent to date has and quantifying the value exchanges taking place in on- been limited to snapshots from web crawls. Previous at- line advertising [7, 27]. There is a lack of transparency tempts to measure the tracking ecosystem, have been done around which third-party services are present on pages, using instrumented measurement platforms, which are not and what happens to the data they collect is a common able to accurately capture how people interact with the web. concern. By monitoring this ecosystem we can drive In this work we present a method for the measurement of awareness of the practices of these services, helping to tracking in the web through a browser extension, as well as inform users whether they are being tracked, and for a method for the aggregation and collection of this informa- what purpose. More transparency and consumer aware- tion which protects the privacy of participants. We deployed ness of these practices can help drive both consumer this extension to more than 5 million users, enabling mea- and regulatory pressure to change, and help researchers surement across multiple countries, ISPs and browser con- to better quantify the privacy and security implications figurations, to give an accurate picture of real-world track- caused by these services.
    [Show full text]
  • Web Privacy Beyond Extensions
    Web Privacy Beyond Extensions: New Browsers Are Pursuing Deep Privacy Protections Peter Snyder <[email protected]> Privacy Researcher at Brave Software In a slide… • Web privacy is a mess. • Privacy activists and researchers are limited by the complexity of modern browsers. • New browser vendors are eager to work with activists to deploy their work. Outline 1. Background Extension focus in practical privacy tools 2. Present Privacy improvements require deep browser modifications 3. Next Steps Call to action, how to keep improving Outline 1. Background Extension focus in practical privacy tools 2. Present Privacy improvements require deep browser modifications 3. Next Steps Call to action, how to keep improving Browsers are Complicated uBlock PrivacyBadger Disconnect AdBlock Plus Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Extensions as a Compromise uBlock PrivacyBadger Disconnect AdBlock Plus Runtime Extensions modifications Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Privacy and Browser Extensions � • Successes! uBlock Origin, HTTPS Everywhere, Ghostery, Disconnect, Privacy Badger, EasyList / EasyPrivacy, etc… • Appealing Easy(er) to build, easy to share • Popular Hundreds of thousands of extensions, Millions of users Browser Extension Limitations � • Limited Capabilities Networking, request modification, rendering, layout, image processing, JS engine, etc… • Security and Privacy Possibly giving capabilities to malicious parties • Performance Limited to JS, secondary access Extensions vs Runtime uBlock PrivacyBadger Disconnect AdBlock Plus Runtime Extensions modifications Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Under Explored Space uBlock PrivacyBadger Disconnect ? AdBlock Plus Runtime Extensions modifications Firefox Safari Privacy concern Chrome Edge / IE Browser maintenance experience Outline 1. Background Extension focus in practical privacy tools 2.
    [Show full text]
  • Non Basta Avere Un Computer Potente, L'ultimo Modello Di Tablet O
    Non basta avere un computer potente, l’ultimo modello di tablet o il sistema operativo più aggiornato; 100 per sfruttarli al massimo servono anche applicazioni, servizi e utility capaci di semplificare e velocizzare le operazioni quotidiane. 78 PC Professionale / Settembre 2017 078-117_Art_Freeware_318.indd 78 30/08/17 12:04 100FREE WARE APP E SERVIZI GRATUITI ● Di Dario Orlandi 078-117_Art_Freeware_318.indd 79 30/08/17 12:04 PROVE / FREEWARE / IL TEMPO IN CUI I SISTEMI OPERATIVI SI DAVANO BATTAGLIA SUL FRONTE DELLE FUNZIONI INTEGRATE È ORMAI PASSATO: PERFINO I DISPOSITIVI MOBILE LASCIANO ORMAI ALL’UTENTE LA FACOLTÀ DI SCEGLIERE GLI STRUMENTI E LE APPLICAZIONI PREFERITE, SCEGLIENDOLE TRA QUELLE DISPONIBILI, ANCHE GRATUITAMENTE, NEI RELATIVI STORE. MA PER TROVARE GLI STRUMENTI MIGLIORI BISOGNA CONOSCER- LI, PROVARLI E CONFRONTARLI. ED È PROPRIO QUELLO CHE ABBIAMO FATTO PER PREPARARE QUESTO ARTICOLO: ABBIAMO INSTALLATO E TESTATO MOLTE DECINE DI APPLICAZIONI, UTILITY E SERVIZI, ALLA RICERCA DELLE SOLUZIONI MIGLIORI PER SODDISFARE LE ESIGENZE DELLA FETTA DI UTENTI PIÙ AMPIA POSSIBILE. ABBIAMO CONCENTRATO L’ATTENZIONE SOLO SUI SOFTWARE GRATUITI, PER PROPORRE UNA COLLEZIONE COMPLETA CHE NON INCIDA SUL PORTAFOGLIO. La diffusione dei sistemi opera- un forte ritardo nei confronti di Lo Store che Microsoft di Windows sono ancora in gran tivi mobile ha reso evidente uno tutti gli altri sistemi operativi: le parte abbandonati a loro stessi: dei difetti storici di Windows: distribuzioni Linux offrono da ha creato per le devono individuare, selezionare l’assenza di un sistema di distri- decenni funzioni dedicate alla ge- applicazioni Windows si e installare i programmi senza buzione e aggiornamento auto- stione dei pacchetti, affiancate in sta lentamente popolando, alcun aiuto da parte del sistema matico per i software di terze seguito da interfacce di gestione operativo.
    [Show full text]
  • Downloading Additional Components of the Webpage
    Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning Muhammad Ikramy1, Hassan Jameel Asghary, Balachander Krishnamurthy Mohamed Ali Kaafary, Anirban Mahantiy AT&T Labs–Research, USA 1 School of EET UNSW, Australia y NICTA, Australia Abstract—Numerous tools have been developed to aggressively and tailor advertisements on websites to the browsing history block the execution of popular JavaScript programs in Web and web activities of users [1], [2], [3]. The class of tools browsers. Such blocking also affects functionality of webpages (including web browser plugins), developed in an attempt to and impairs user experience. As a consequence, many privacy preserve user privacy (e.g., NoScript [4], Ghostery [5], and preserving tools that have been developed to limit online tracking, Adblock Plus [6]), aims to block JavaScript programs and other often executed via JavaScript programs, may suffer from poor components of a webpage that may compromise user privacy performance and limited uptake. A mechanism that can isolate JavaScript programs necessary for proper functioning of the and enable tracking. However, aggressive blocking can hinder website from tracking JavaScript programs would thus be useful. proper functioning of the website and impact user’s browsing Through the use of a manually labelled dataset composed of 2,612 experience [7], [8] (See AppendixE for an example of how JavaScript programs, we show how current privacy preserving a tool blocks content necessary for proper website function.). tools are ineffective in finding the right balance between blocking A mechanism that can properly isolate JavaScript programs tracking JavaScript programs and allowing functional JavaScript necessary for “legitimate” web functioning of the website from code.
    [Show full text]
  • Anti-Mapa De Privacidade
    Anti-mapa de privacidade Feito para você não ser rastreado Organização: Bárbara Simão e Rafael Zanatta Pesquisa e produção de textos: Bárbara Simão, Juliana Oms, Livia Torres e Rafael Zanatta Revisão: Rafael Zanatta Revisão de texto: Bárbara Prado Simão Design: Talita Patricio Martins Realização Supervisão: Carla Yue e Teresa Liporace Coordenação executiva: Elici Bueno Idec - Instituto Brasileiro de Defesa do Consumidor Rua Desembargador Guimarães, 21 - Água Branca CEP 05002-050 - São Paulo-SP Telefone: 11 3874-2150 [email protected] www.idec.org.br Por que um anti-mapa? Há quem diga que dados O mercado de dados funciona Esta situação gera sérias pessoais são o “petróleo assim: empresas desenvolvem consequências para o modo da era digital”. Enquanto modelos para prever nossos como vivemos e nossa isolados, não representam comportamentos, identificar democracia. Por isso, a muita coisa nem possuem nossas preferências e nos aprovação da Lei Geral tanto valor, mas quando influenciar com propagandas de Dados Pessoais foi tão integrados e analisados em especialmente direcionadas importante: nossos dados conjunto revelam perfis de para nós, pois sabem deixarão de ser objetos consumo, de crédito, hábitos aquilo que nos sensibiliza a passíveis de extração, pois recorrentes e até padrões de partir de nosso padrão de são parte de nós e de quem personalidade. comportamento - situação somos. Ao prever princípios muitas vezes despercebida. éticos e direitos básicos aos Estes perfis que criam de nós cidadãos, a lei nos devolve podem até gerar discriminação o controle sobre todas as com preços diferenciados, por informações que produzimos exemplo, a partir do local onde - é como o Código de Defesa realizamos a compra ou da do Consumidor para as novas renda obtida.
    [Show full text]