Browser anonymization functions compared
Firefox developers have equipped the browser with a completion feature for forms; it stores 10 values by default. Users can disable this function completely in the configuration dialog if needed. This is also where you can tell Konqueror to send do-not-track messages. On request, the KDE browser draws a frame around incompletely loaded images and prevents automatic reloading of pages and redirection to other websites. An ad filter blocks URLs that are on a blacklist. Users can maintain a blacklist themselves or reference a list on the web.
Konqueror only accepts cookies signed by the server, but it can also reject cookies completely, prompt the user, and delete cookies on exiting. Session cookies are blocked separately for selected pages; exceptions are allowed. Cookies are managed so that stored data is grouped neatly by domain name; a search box helps locate a candidate. Just one click lets you view all the data for a cookie; however, users can only delete a single cookie, or all at once.
In the somewhat rudimentary extension management feature, users can switch extensions on and off and set up special rules. During operation, Konqueror also alternates between the KHTML and WebKit engines, and the spell checker relies exclusively on local dictionaries. The browser cannot delete web storage and loads web fonts as a matter of principle. It does not have a geolocation API or a privacy mode.
Fear of Persecution
The default state of all the test candidates is frightening. To surf fairly anonymously, users themselves have to work their way through a jungle of setup dialogs. Even if you have defined all possible restrictions, the browser will still readily reveal a huge amount of information, and privacy mode does not earn that name in any of the programs: In general, the browsers simply delete all data on exit. Some browsers can camouflage the underlying technologies or rename them.
Chrome turned out to be particularly talkative. It is difficult to stop it from phoning home. Epiphany lags behind the competition; with so few configuration options, users will find it difficult to keep the browser quiet.
Although Firefox offers much more in the settings dialogs, it does not impress with its clarity. On the plus side, Firefox does have thousands of add-ons that help harden the browser. Konqueror in particular lacks particular settings for newer web technologies, such as web storage.
Users who want to surf anonymously, should resort to Firefox and spend some time setting it up with native features and installing anonymizing add-ons.
- Chrome: https://www.google.com/intl/en/chrome/browser/?hl=en
- Epiphany: http://projects.gnome.org/epiphany
- Firefox: http://www.mozilla.org/firefox
- Konqueror: http://www.konqueror.org
- Opera: http://www.opera.com/
- Opera Next: http://www.opera.com/developer/next
- Blink: http://www.chromium.org/blink
- WebKit: http://www.webkit.org
- Web storage:http://www.w3.org/TR/webstorage
- Geolocation API: http://www.w3.org/TR/geolocation-API
- Chromium: http://www.chromium.org
- NPAPI ClearSiteData API: https://wiki.mozilla.org/NPAPI:ClearSiteData
- Chrome Web Store: https://chrome.google.com/webstore/category/extensions?hl=en
- Your own server for Firefox sync: http://docs.services.mozilla.com/howtos/run-sync.html
Buy this article as PDF
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.