Browser anonymization functions compared
Firefox developers have equipped the browser with a completion feature for forms; it stores 10 values by default. Users can disable this function completely in the configuration dialog if needed. This is also where you can tell Konqueror to send do-not-track messages. On request, the KDE browser draws a frame around incompletely loaded images and prevents automatic reloading of pages and redirection to other websites. An ad filter blocks URLs that are on a blacklist. Users can maintain a blacklist themselves or reference a list on the web.
Konqueror only accepts cookies signed by the server, but it can also reject cookies completely, prompt the user, and delete cookies on exiting. Session cookies are blocked separately for selected pages; exceptions are allowed. Cookies are managed so that stored data is grouped neatly by domain name; a search box helps locate a candidate. Just one click lets you view all the data for a cookie; however, users can only delete a single cookie, or all at once.
In the somewhat rudimentary extension management feature, users can switch extensions on and off and set up special rules. During operation, Konqueror also alternates between the KHTML and WebKit engines, and the spell checker relies exclusively on local dictionaries. The browser cannot delete web storage and loads web fonts as a matter of principle. It does not have a geolocation API or a privacy mode.
Fear of Persecution
The default state of all the test candidates is frightening. To surf fairly anonymously, users themselves have to work their way through a jungle of setup dialogs. Even if you have defined all possible restrictions, the browser will still readily reveal a huge amount of information, and privacy mode does not earn that name in any of the programs: In general, the browsers simply delete all data on exit. Some browsers can camouflage the underlying technologies or rename them.
Chrome turned out to be particularly talkative. It is difficult to stop it from phoning home. Epiphany lags behind the competition; with so few configuration options, users will find it difficult to keep the browser quiet.
Although Firefox offers much more in the settings dialogs, it does not impress with its clarity. On the plus side, Firefox does have thousands of add-ons that help harden the browser. Konqueror in particular lacks particular settings for newer web technologies, such as web storage.
Users who want to surf anonymously, should resort to Firefox and spend some time setting it up with native features and installing anonymizing add-ons.
- Chrome: https://www.google.com/intl/en/chrome/browser/?hl=en
- Epiphany: http://projects.gnome.org/epiphany
- Firefox: http://www.mozilla.org/firefox
- Konqueror: http://www.konqueror.org
- Opera: http://www.opera.com/
- Opera Next: http://www.opera.com/developer/next
- Blink: http://www.chromium.org/blink
- WebKit: http://www.webkit.org
- Web storage:http://www.w3.org/TR/webstorage
- Geolocation API: http://www.w3.org/TR/geolocation-API
- Chromium: http://www.chromium.org
- NPAPI ClearSiteData API: https://wiki.mozilla.org/NPAPI:ClearSiteData
- Chrome Web Store: https://chrome.google.com/webstore/category/extensions?hl=en
- Your own server for Firefox sync: http://docs.services.mozilla.com/howtos/run-sync.html
Buy this article as PDF
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.