Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Your graphics card could be used to track you across the web regardless of cookie consent
PC Gamer ^ | 31 January 2022 | Jacob Ridley

Posted on 01/31/2022 11:33:39 AM PST by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-31 last
To: FLT-bird

VPN won’t help at all, unfortunately, because it is something that is independent of your TCP/IP connection.

Imagine if I held a bright Red, Pink & Purple umbrella with distinctive stripes and polka dots. Then I don a mask (like using VPN). People won’t know who’s under the mask, but when they see the umbrella, they’ll know it’s the same person as last time: that’s what advertisers want to know. And they’ll be able to track you (okay, I mean your computer - not you as an individual) across websites unless you disable JavaScript.


21 posted on 01/31/2022 8:02:23 PM PST by mbj
[ Post Reply | Private Reply | To 15 | View Replies]

To: cymbeline
I'm in the middle of a large scale port of support systems that run on Linux and Windows to a microservices architecture wrapped in Docker containers, deployed in kubernetes clusters and hosted in "the cloud". Lots of the server side code was built with Java and took a hit in recent weeks with the log4jShell remote control execution flaw. It took 4 passes for the library itself to be patched to a secure state. Finding all the places where it was used and updating those vulnerable systems has been a huge distraction, but a necessary evil to patch.

Our customer demands security scans of all software that will be delivered for use and a clean bill of health from a security perspective. The tools we use are maintained by a reputable supplier that keeps the scanner up to date with all the published vulnerabilities and adds heuristics to look for additional flaws. Anything flagged must be fixed before delivery.

22 posted on 01/31/2022 9:26:06 PM PST by Myrddin
[ Post Reply | Private Reply | To 13 | View Replies]

To: Myrddin

“The tools we use are maintained by a reputable supplier”

Ah but human accidents and sabotage happen so, well, it’s job security for you guys. Multiple cats chasing multiple mice, huh?

What percentage of security breaches begin with human error?


23 posted on 02/01/2022 4:55:40 AM PST by cymbeline
[ Post Reply | Private Reply | To 22 | View Replies]

To: ShadowAce

“Another option to counter DrawnApart, or techniques like it, could be to use a blocking script that prevents access to at-risk resources.”

I keep sharing it and no one listens. “ NoScript “ just works and blocks everything by default yet lets you selectively turn on only the bare minimum to make a page work.


24 posted on 02/01/2022 6:00:19 AM PST by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Openurmind

I’ve been using NoScript for years now. While it may be somewhat inconvenient, I’ve gotten used to the way my browser now works with it. It also lets me know which sites to avoid in general.


25 posted on 02/01/2022 6:22:23 AM PST by ShadowAce (Linux - The Ultimate Windows Service Pack )
[ Post Reply | Private Reply | To 24 | View Replies]

To: ShadowAce

Yep, absolutely. If I can’t get the basic site script JS that makes the buttons work, or lets me read it using the first option in the list I just move on.

It really opens your eyes to how many hidden 3rd party tracking and fingerprinting scripts there really are on a lot of these sites.

After you use it you learn what is safe to use yet still block the other 25-50 scripts. What I really like is that you can actually block all the Google services on almost all sites without them breaking.

But some are now tying them to together, if you don’t allow the google then nothing will work. As you say, then just move on and find what you want elsewhere that is not pulling this game.

Another fringe benefit positive I have found with NoScript is that it happens to get around a lot of paywalls because the cover page or pop up is further down the inline stack and blocked as a separate item in NoScript. :)


26 posted on 02/01/2022 6:48:46 AM PST by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 25 | View Replies]

To: ShadowAce

If you are identified as a dissident, they will find many ways to track your public utterances of Wrongthink.


27 posted on 02/01/2022 6:50:47 AM PST by Mr. Jeeves ([CTRL]-[GALT]-[DELETE])
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Know what else Ace? I like being able to click these items and go use “Blacklight”. It is extremely exposing with what these are actually doing.


28 posted on 02/01/2022 6:56:32 AM PST by Openurmind (The ultimate test of a moral society is the kind of world it leaves to its children. ~ D. Bonhoeffer)
[ Post Reply | Private Reply | To 25 | View Replies]

To: cymbeline
What percentage of security breaches begin with human error?

I don't have hard numbers, but practical experience deploying website updates that failed was most often attributable to a failure to get some software settings correct on the deployment. At the coding level, failure to check return values, failure to initialize variables before using them, using memory that has been freed, failing to free memory after use, reading/writing off the end of an array, returning a reference to a local variable. Little stuff. The class of tools emulating the early "lint" for C is helpful for finding problems in source code. At runtime, tools like purify or valgrind expose memory misuse, but only if the code is executed. Code coverage analyzers track lines of code actually executed so your test cases can be improved to run all of the code and help purify or valgrind report a problem. When it's all "done", source code analysis with tools such as fortify driven with known defect databases look for the odd stuff.

Modern software depends on a lot of reuse of other people's work. A defect widely shared gets reported as a Common Vulnerability Enumeration (CVE) with a description of how to replicate the defect, how to exploit it and what release of the commonly shared library has been posted with a fix for the problem.

Between security and regular development, there is plenty of work in the queue.

29 posted on 02/01/2022 7:42:07 AM PST by Myrddin
[ Post Reply | Private Reply | To 23 | View Replies]

To: Pol-92064

If you want privacy get a dog.

;-)


30 posted on 02/01/2022 7:44:40 AM PST by cgbg (A kleptocracy--if they can keep it. Think of it as the Cantillon Effect in action.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Myrddin

“Modern software depends on a lot of reuse of other people’s work.”

The understatement of the year, but it has to be that way.


31 posted on 02/01/2022 9:26:59 AM PST by cymbeline
[ Post Reply | Private Reply | To 29 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-31 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson