Gass
Member
"Where it's all at and what to know - should be understood, and of a learning, caring, sharing resource in purpose" !
Posting Rules are same as Adguard Site - https://forum.adguard.com/index.php?threads/important-forum-rules.14859/ There is no need for politics, religion, culture differences as well as bar talk in this thread.
Come learn with us, or be a teacher/instructor of what you've mastered of an understanding and knowledge you've come to know. Though it would be most helpful to include what Device, Platform OS and it's version, being related anything wise to your post(s) or question(s) made. This is unless it's already part of your Adguard signature as displayed or therein added as a "Spoiler" in your Adguard signature.
I hope you'll find this Thread interesting and just as Helpful, please contribute at any level of experience and give a link of the source info, that alone helps a bunch for others to know and adds to the Threads resources of being Fact Based information and knowledge.
I open the door and hardy welcome anyone who comments, adds contents, has answers, gives general or specific advise in deployment concepts and of software that benefits, what they practice earnestly and can backup their added info. with fact(s), shared here with us of a link to the source of this field in knowledge and information. In saying A and B should be done - when C, D and E may help everyone that of a link offers a fuller detail(s) in the concept, principles and practice. Then any News or Articles that is 2017 if possible - not older than 2015 at the most. EX: When possible offer a link, or the source of a fact(s) you've found that goes more in depth than the forum here allows anyone to specific details. EX1: If it's something you've used/using, something you've just herd of in the news/surfing, scandals warnings, bad policies brought to light, and you share it please give a date of how current it is and the site name, if it's a software that benefits or not the name and version of it.
If an opinion you have, then add something to the logic as why it's seen or you feel that way about it - that helps for friendly helpful polite rebuttals, and to insights of why others should know of the pointed out facts in pro's and con's.
I do wish this Topic to stay friendly, understanding, mature and open to a schooling/teaching nature - and NOT to a competitive nature, and/or then what's right for one may not be right for someone else - allow for this in others opinions, we're all friends here with one common interest in Adguard and I hope online safety too.
I'm personally a Windows and Android user, so my content will follow that line of info. but, I do hope others add other info. of their chosen platforms and devices in that knowledge you've gained for a complete member based ecosystem in knowledge being shared here to one and all.
This will probably not be a resource for the knowledgably, (except a refresh ?), but all the same I hope you'll add you expertise to this resource. Mostly it's for those members like me, that wish to know and remember, of more than just scattered bits we find while surfing or that of hearsay in off-topic conversations. A Thread Topic intended and devoted as a shared resource of common sense practices and approach for everyone's benefit across all mediums and devices compatible of users interactions online.
Possible "Topic Fields of Exploration" (TFoE) and Conversations of this Thread, and then resource links given to a basic understanding:
(each [Green "Spoiler" TAB] labeled has it's own breakdown in informational "links" found on the Wikipedia site or others.)
I've included a lot of "Topic Fields", but welcome more that I've missed if staying relevant to a general principle to safe guarding yourself online.
Posting Rules are same as Adguard Site - https://forum.adguard.com/index.php?threads/important-forum-rules.14859/ There is no need for politics, religion, culture differences as well as bar talk in this thread.
Come learn with us, or be a teacher/instructor of what you've mastered of an understanding and knowledge you've come to know. Though it would be most helpful to include what Device, Platform OS and it's version, being related anything wise to your post(s) or question(s) made. This is unless it's already part of your Adguard signature as displayed or therein added as a "Spoiler" in your Adguard signature.
I hope you'll find this Thread interesting and just as Helpful, please contribute at any level of experience and give a link of the source info, that alone helps a bunch for others to know and adds to the Threads resources of being Fact Based information and knowledge.
I open the door and hardy welcome anyone who comments, adds contents, has answers, gives general or specific advise in deployment concepts and of software that benefits, what they practice earnestly and can backup their added info. with fact(s), shared here with us of a link to the source of this field in knowledge and information. In saying A and B should be done - when C, D and E may help everyone that of a link offers a fuller detail(s) in the concept, principles and practice. Then any News or Articles that is 2017 if possible - not older than 2015 at the most. EX: When possible offer a link, or the source of a fact(s) you've found that goes more in depth than the forum here allows anyone to specific details. EX1: If it's something you've used/using, something you've just herd of in the news/surfing, scandals warnings, bad policies brought to light, and you share it please give a date of how current it is and the site name, if it's a software that benefits or not the name and version of it.
If an opinion you have, then add something to the logic as why it's seen or you feel that way about it - that helps for friendly helpful polite rebuttals, and to insights of why others should know of the pointed out facts in pro's and con's.
I do wish this Topic to stay friendly, understanding, mature and open to a schooling/teaching nature - and NOT to a competitive nature, and/or then what's right for one may not be right for someone else - allow for this in others opinions, we're all friends here with one common interest in Adguard and I hope online safety too.
I'm personally a Windows and Android user, so my content will follow that line of info. but, I do hope others add other info. of their chosen platforms and devices in that knowledge you've gained for a complete member based ecosystem in knowledge being shared here to one and all.
This will probably not be a resource for the knowledgably, (except a refresh ?), but all the same I hope you'll add you expertise to this resource. Mostly it's for those members like me, that wish to know and remember, of more than just scattered bits we find while surfing or that of hearsay in off-topic conversations. A Thread Topic intended and devoted as a shared resource of common sense practices and approach for everyone's benefit across all mediums and devices compatible of users interactions online.
Possible "Topic Fields of Exploration" (TFoE) and Conversations of this Thread, and then resource links given to a basic understanding:
(each [Green "Spoiler" TAB] labeled has it's own breakdown in informational "links" found on the Wikipedia site or others.)
I've included a lot of "Topic Fields", but welcome more that I've missed if staying relevant to a general principle to safe guarding yourself online.
Desktop / Laptop Computer - https://en.wikipedia.org/wiki/Desktop_computer
Mobile Device - https://en.wikipedia.org/wiki/Mobile_device
Connected Devices - https://en.wikipedia.org/wiki/Connected_Devices
Internet appliance - (An Internet appliance is a consumer device whose main function is easy access to Internet services).https://en.wikipedia.org/wiki/Internet_appliance
Mobile Device - https://en.wikipedia.org/wiki/Mobile_device
Connected Devices - https://en.wikipedia.org/wiki/Connected_Devices
Internet appliance - (An Internet appliance is a consumer device whose main function is easy access to Internet services).https://en.wikipedia.org/wiki/Internet_appliance
Internet - The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. https://en.wikipedia.org/wiki/Internet
World Wide Web (WWW) - Is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet.
https://en.wikipedia.org/wiki/World_Wide_Web
Domain Name System - https://en.wikipedia.org/wiki/Domain_Name_System
Internet Security - https://en.wikipedia.org/wiki/Internet_security
Electronic Mail / aka eMail - https://en.wikipedia.org/wiki/Email
Email Client - https://en.wikipedia.org/wiki/Email_client
World Wide Web (WWW) - Is an information space where documents and other web resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed via the Internet.
https://en.wikipedia.org/wiki/World_Wide_Web
Domain Name System - https://en.wikipedia.org/wiki/Domain_Name_System
Internet Security - https://en.wikipedia.org/wiki/Internet_security
Electronic Mail / aka eMail - https://en.wikipedia.org/wiki/Email
Email Client - https://en.wikipedia.org/wiki/Email_client
Operating System (OS) - Is system software that manages computer hardware and software resources and the operating system acts as an intermediary between software programs and the computers hardware.
https://en.wikipedia.org/wiki/Operating_system
Web Browsers - https://en.wikipedia.org/wiki/Web_browser
Browser Extensions - https://en.wikipedia.org/wiki/Browser_extension
NOTE: Browser extensions have access to everything done by the browser, and can do things like inject ads into web pages, or make "background" HTTP requests to third-party servers.
While web pages are constrained by the "security model" of the web browser (in particular, the same-origin policy), browser extensions are "not".
VPN's (Virtual Private Network) - https://en.wikipedia.org/wiki/Virtual_private_network
Firewall - https://en.wikipedia.org/wiki/Firewall_(computing)
Comparison of Firewalls - https://en.wikipedia.org/wiki/Comparison_of_firewalls
Antivirus Software - https://en.wikipedia.org/wiki/Antivirus_software
Sandbox - Used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.
https://en.wikipedia.org/wiki/Sandbox_(computer_security)
https://en.wikipedia.org/wiki/Operating_system
Web Browsers - https://en.wikipedia.org/wiki/Web_browser
Browser Extensions - https://en.wikipedia.org/wiki/Browser_extension
NOTE: Browser extensions have access to everything done by the browser, and can do things like inject ads into web pages, or make "background" HTTP requests to third-party servers.
While web pages are constrained by the "security model" of the web browser (in particular, the same-origin policy), browser extensions are "not".
VPN's (Virtual Private Network) - https://en.wikipedia.org/wiki/Virtual_private_network
Firewall - https://en.wikipedia.org/wiki/Firewall_(computing)
Comparison of Firewalls - https://en.wikipedia.org/wiki/Comparison_of_firewalls
Antivirus Software - https://en.wikipedia.org/wiki/Antivirus_software
Sandbox - Used to execute untested or untrusted programs or code, possibly from unverified or untrusted third parties, suppliers, users or websites, without risking harm to the host machine or operating system.
https://en.wikipedia.org/wiki/Sandbox_(computer_security)
The domain of privacy partially overlaps security (confidentiality), which can include the concepts of appropriate use, as well as protection of information. The right not to be subjected to unsanctioned invasion of privacy by the government, corporations or individuals is part of many countries' privacy laws, and in some cases, constitutions. This is exacerbated by the research indicating that personal traits such as sexual orientation, race, religious and political views, personality, or intelligence can be inferred based on the wide variety of digital footprint, such as samples of text, browsing logs, or Facebook Likes.
https://en.wikipedia.org/wiki/Privacy
Internet Privacy - https://en.wikipedia.org/wiki/Internet_privacy
Data Mining - the computing process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The goal is the extraction of patterns and knowledge from large amounts of data, applied to any form of large-scale data or information processing (collection, extraction, warehousing, analysis, and statistics).
https://en.wikipedia.org/wiki/Data_mining
Fingerprinting (algorithm) - https://en.wikipedia.org/wiki/Fingerprint_(computing)
Device Fingerprint - https://en.wikipedia.org/wiki/Device_fingerprint
Note: In fact, device fingerprints can be used to predict the likelihood users will commit fraud based on their signal profile, before they have even committed fraud. Prior to early 2017, device fingerprinting was limited to single browsers, a cross browser fingerprinting method has been published which allows tracking of a user across multiple browsers on the same device.
Canvas Fingerprinting - https://en.wikipedia.org/wiki/Canvas_fingerprinting
TCP/IP Stack Fingerprinting - https://en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting
Audio Fingerprint - http://mtg.upf.edu/files/publications/MMSP-2002-pcano.pdf
My Prior Topic on Fingerprinting - https://forum.adguard.com/index.php?threads/understanding-fingerprinting.12045/
Evercookie - https://en.wikipedia.org/wiki/Evercookie
Zombie Cookie - https://en.wikipedia.org/wiki/Zombie_cookie
HTTP Cookie / aka web cookie, Internet cookie, browser cookie, or simply cookie - https://en.wikipedia.org/wiki/HTTP_cookie
Same link above goes into these as well. . .
Supercookie, can be a potential security concern and are therefore often blocked by web browsers. If unblocked by the browser, an attacker in control of a malicious website could set a supercookie and potentially disrupt or impersonate legitimate user requests to another website that shares the same top-level domain or public suffix as the malicious website.
Third-party Cookie, belongs to a domain different from the one shown in the address bar. This sort of cookie typically appears when web pages feature content from external websites, such as banner advertisements. This opens up the potential for tracking the user's browsing history, and is often used by advertisers in an effort to serve relevant advertisements to each user.
HTTP ETag - If the resource representation at that URL ever changes, a new and different ETag is assigned. Used in this manner ETags are similar to fingerprints, and they can be quickly compared to determine whether two representations of a resource are the same. ETags can be used to track unique users, cached by the browser and returned with subsequent requests for the same resource, a tracking server can simply repeat any ETag received from the browser to ensure an assigned ETag persists indefinitely (in a similar way to persistent cookies). Additional caching headers can also enhance the preservation of ETag data.
So ETag's are a Cookieless cookies in other words. https://en.wikipedia.org/wiki/HTTP_ETag
Local Shared Object / (LSOs), aka Flash Cookies - https://en.wikipedia.org/wiki/Local_shared_object
HTML5 - https://en.wikipedia.org/wiki/HTML5
Comparison of HTML5 and Flash - https://en.wikipedia.org/wiki/Comparison_of_HTML5_and_Flash
Web Storage / There are two main web storage types: local storage and session storage, behaving similarly to persistent cookies and session cookies respectively. - https://en.wikipedia.org/wiki/Web_storage
Browser Sniffing - https://en.wikipedia.org/wiki/Browser_sniffing
Vulnerability (computing) - https://en.wikipedia.org/wiki/Vulnerability_(computing)
Persistence - https://en.wikipedia.org/wiki/Persistence_(computer_science)
Website Visitor Tracking - https://en.wikipedia.org/wiki/Website_visitor_tracking
Web Beacon - https://en.wikipedia.org/wiki/Web_beacon
Computer and Network Surveillance - https://en.wikipedia.org/wiki/Computer_and_network_surveillance
https://en.wikipedia.org/wiki/Privacy
Internet Privacy - https://en.wikipedia.org/wiki/Internet_privacy
Data Mining - the computing process of discovering patterns in large data sets involving methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The goal is the extraction of patterns and knowledge from large amounts of data, applied to any form of large-scale data or information processing (collection, extraction, warehousing, analysis, and statistics).
https://en.wikipedia.org/wiki/Data_mining
Fingerprinting (algorithm) - https://en.wikipedia.org/wiki/Fingerprint_(computing)
Device Fingerprint - https://en.wikipedia.org/wiki/Device_fingerprint
Note: In fact, device fingerprints can be used to predict the likelihood users will commit fraud based on their signal profile, before they have even committed fraud. Prior to early 2017, device fingerprinting was limited to single browsers, a cross browser fingerprinting method has been published which allows tracking of a user across multiple browsers on the same device.
Canvas Fingerprinting - https://en.wikipedia.org/wiki/Canvas_fingerprinting
TCP/IP Stack Fingerprinting - https://en.wikipedia.org/wiki/TCP/IP_stack_fingerprinting
Audio Fingerprint - http://mtg.upf.edu/files/publications/MMSP-2002-pcano.pdf
My Prior Topic on Fingerprinting - https://forum.adguard.com/index.php?threads/understanding-fingerprinting.12045/
Evercookie - https://en.wikipedia.org/wiki/Evercookie
Zombie Cookie - https://en.wikipedia.org/wiki/Zombie_cookie
HTTP Cookie / aka web cookie, Internet cookie, browser cookie, or simply cookie - https://en.wikipedia.org/wiki/HTTP_cookie
Same link above goes into these as well. . .
Supercookie, can be a potential security concern and are therefore often blocked by web browsers. If unblocked by the browser, an attacker in control of a malicious website could set a supercookie and potentially disrupt or impersonate legitimate user requests to another website that shares the same top-level domain or public suffix as the malicious website.
Third-party Cookie, belongs to a domain different from the one shown in the address bar. This sort of cookie typically appears when web pages feature content from external websites, such as banner advertisements. This opens up the potential for tracking the user's browsing history, and is often used by advertisers in an effort to serve relevant advertisements to each user.
HTTP ETag - If the resource representation at that URL ever changes, a new and different ETag is assigned. Used in this manner ETags are similar to fingerprints, and they can be quickly compared to determine whether two representations of a resource are the same. ETags can be used to track unique users, cached by the browser and returned with subsequent requests for the same resource, a tracking server can simply repeat any ETag received from the browser to ensure an assigned ETag persists indefinitely (in a similar way to persistent cookies). Additional caching headers can also enhance the preservation of ETag data.
So ETag's are a Cookieless cookies in other words. https://en.wikipedia.org/wiki/HTTP_ETag
Local Shared Object / (LSOs), aka Flash Cookies - https://en.wikipedia.org/wiki/Local_shared_object
HTML5 - https://en.wikipedia.org/wiki/HTML5
Comparison of HTML5 and Flash - https://en.wikipedia.org/wiki/Comparison_of_HTML5_and_Flash
Web Storage / There are two main web storage types: local storage and session storage, behaving similarly to persistent cookies and session cookies respectively. - https://en.wikipedia.org/wiki/Web_storage
Browser Sniffing - https://en.wikipedia.org/wiki/Browser_sniffing
Vulnerability (computing) - https://en.wikipedia.org/wiki/Vulnerability_(computing)
Persistence - https://en.wikipedia.org/wiki/Persistence_(computer_science)
Website Visitor Tracking - https://en.wikipedia.org/wiki/Website_visitor_tracking
Web Beacon - https://en.wikipedia.org/wiki/Web_beacon
Computer and Network Surveillance - https://en.wikipedia.org/wiki/Computer_and_network_surveillance
Last edited: