Browser anonymization functions compared
Firefox developers have equipped the browser with a completion feature for forms; it stores 10 values by default. Users can disable this function completely in the configuration dialog if needed. This is also where you can tell Konqueror to send do-not-track messages. On request, the KDE browser draws a frame around incompletely loaded images and prevents automatic reloading of pages and redirection to other websites. An ad filter blocks URLs that are on a blacklist. Users can maintain a blacklist themselves or reference a list on the web.
Konqueror only accepts cookies signed by the server, but it can also reject cookies completely, prompt the user, and delete cookies on exiting. Session cookies are blocked separately for selected pages; exceptions are allowed. Cookies are managed so that stored data is grouped neatly by domain name; a search box helps locate a candidate. Just one click lets you view all the data for a cookie; however, users can only delete a single cookie, or all at once.
In the somewhat rudimentary extension management feature, users can switch extensions on and off and set up special rules. During operation, Konqueror also alternates between the KHTML and WebKit engines, and the spell checker relies exclusively on local dictionaries. The browser cannot delete web storage and loads web fonts as a matter of principle. It does not have a geolocation API or a privacy mode.
Fear of Persecution
The default state of all the test candidates is frightening. To surf fairly anonymously, users themselves have to work their way through a jungle of setup dialogs. Even if you have defined all possible restrictions, the browser will still readily reveal a huge amount of information, and privacy mode does not earn that name in any of the programs: In general, the browsers simply delete all data on exit. Some browsers can camouflage the underlying technologies or rename them.
Chrome turned out to be particularly talkative. It is difficult to stop it from phoning home. Epiphany lags behind the competition; with so few configuration options, users will find it difficult to keep the browser quiet.
Although Firefox offers much more in the settings dialogs, it does not impress with its clarity. On the plus side, Firefox does have thousands of add-ons that help harden the browser. Konqueror in particular lacks particular settings for newer web technologies, such as web storage.
Users who want to surf anonymously, should resort to Firefox and spend some time setting it up with native features and installing anonymizing add-ons.
- Chrome: https://www.google.com/intl/en/chrome/browser/?hl=en
- Epiphany: http://projects.gnome.org/epiphany
- Firefox: http://www.mozilla.org/firefox
- Konqueror: http://www.konqueror.org
- Opera: http://www.opera.com/
- Opera Next: http://www.opera.com/developer/next
- Blink: http://www.chromium.org/blink
- WebKit: http://www.webkit.org
- Web storage:http://www.w3.org/TR/webstorage
- Geolocation API: http://www.w3.org/TR/geolocation-API
- Chromium: http://www.chromium.org
- NPAPI ClearSiteData API: https://wiki.mozilla.org/NPAPI:ClearSiteData
- Chrome Web Store: https://chrome.google.com/webstore/category/extensions?hl=en
- Your own server for Firefox sync: http://docs.services.mozilla.com/howtos/run-sync.html
Buy this article as PDF
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.