Browser anonymization functions compared
Firefox developers have equipped the browser with a completion feature for forms; it stores 10 values by default. Users can disable this function completely in the configuration dialog if needed. This is also where you can tell Konqueror to send do-not-track messages. On request, the KDE browser draws a frame around incompletely loaded images and prevents automatic reloading of pages and redirection to other websites. An ad filter blocks URLs that are on a blacklist. Users can maintain a blacklist themselves or reference a list on the web.
Konqueror only accepts cookies signed by the server, but it can also reject cookies completely, prompt the user, and delete cookies on exiting. Session cookies are blocked separately for selected pages; exceptions are allowed. Cookies are managed so that stored data is grouped neatly by domain name; a search box helps locate a candidate. Just one click lets you view all the data for a cookie; however, users can only delete a single cookie, or all at once.
In the somewhat rudimentary extension management feature, users can switch extensions on and off and set up special rules. During operation, Konqueror also alternates between the KHTML and WebKit engines, and the spell checker relies exclusively on local dictionaries. The browser cannot delete web storage and loads web fonts as a matter of principle. It does not have a geolocation API or a privacy mode.
Fear of Persecution
The default state of all the test candidates is frightening. To surf fairly anonymously, users themselves have to work their way through a jungle of setup dialogs. Even if you have defined all possible restrictions, the browser will still readily reveal a huge amount of information, and privacy mode does not earn that name in any of the programs: In general, the browsers simply delete all data on exit. Some browsers can camouflage the underlying technologies or rename them.
Chrome turned out to be particularly talkative. It is difficult to stop it from phoning home. Epiphany lags behind the competition; with so few configuration options, users will find it difficult to keep the browser quiet.
Although Firefox offers much more in the settings dialogs, it does not impress with its clarity. On the plus side, Firefox does have thousands of add-ons that help harden the browser. Konqueror in particular lacks particular settings for newer web technologies, such as web storage.
Users who want to surf anonymously, should resort to Firefox and spend some time setting it up with native features and installing anonymizing add-ons.
- Chrome: https://www.google.com/intl/en/chrome/browser/?hl=en
- Epiphany: http://projects.gnome.org/epiphany
- Firefox: http://www.mozilla.org/firefox
- Konqueror: http://www.konqueror.org
- Opera: http://www.opera.com/
- Opera Next: http://www.opera.com/developer/next
- Blink: http://www.chromium.org/blink
- WebKit: http://www.webkit.org
- Web storage:http://www.w3.org/TR/webstorage
- Geolocation API: http://www.w3.org/TR/geolocation-API
- Chromium: http://www.chromium.org
- NPAPI ClearSiteData API: https://wiki.mozilla.org/NPAPI:ClearSiteData
- Chrome Web Store: https://chrome.google.com/webstore/category/extensions?hl=en
- Your own server for Firefox sync: http://docs.services.mozilla.com/howtos/run-sync.html
Buy this article as PDF
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm