Skip to main content

Questions tagged [privacy-protection]

The tag has no usage guidance.

1 vote
2 answers
318 views

How to create a Firefox container dedicated for web search?

Is there a way to create a Firefox container dedicated for web search, such as Google? In this way, I can remain logged in for Google in other situations and keep my web searches hidden from Google. ...
xuhdev's user avatar
  • 1,811
1 vote
0 answers
82 views

How to keep local searches local on Win11?

To launch a program on Windows 11 I press the win-key and type the name of the software. But there is a huge privacy issue with the latest version of Windows: The system sends everything the user ...
Zini's user avatar
  • 61
0 votes
2 answers
119 views

Privacy: VPN and DNS

I'm using a VPN for privacy purposes. If I ensure that the DNS requests are sent through the VPN I can select whatever DNS Server I like? Is there any advantage to using the DNS Server provided by the ...
firendlyQuestion's user avatar
1 vote
0 answers
23 views

Description for category names of Mozilla Shavar blacklist

Looking at the Mozilla Shavar blacklist, which is used for tracking protection (ex. in Mozilla Firefox), the services are grouped in several categories: Email EmailStrict Advertising Content Analytics ...
rabudde's user avatar
  • 143
3 votes
2 answers
334 views

How does google know my real location exactly?

I searched this question here and found this answer and this answer but neither works for me. I set US timezone in Windows, start VPN with a US public ip address, clear all cookies/cache/history, ...
William's user avatar
  • 273
1 vote
1 answer
127 views

What to check when a stranger uses your computer

My significant other is a lecturer in Social Sciences at a university and today one of their students did not manage to bring a laptop to her class in a class that needed one. She ended up offering ...
Kernel's user avatar
  • 113
0 votes
0 answers
37 views

Without cookies, is it still possible for an online identity to be matched across different ip addresses?

It's easy to verify that, after changing my ip address (such as by connecting to a VPN), my online identity is maintained (site logins remain active, settings remain unchanged, etc.) Of course, once I ...
AffableAmbler's user avatar
-2 votes
1 answer
55 views

Can i block access to my network

How can I stop a fellow tenant from hacking my router, and gaining access to all my information - and he keeps changing my passwords.
SpideySences's user avatar
2 votes
4 answers
4k views

How do I disable telemetry in Thunderbird?

I'm running Thunderbird 91. I noticed in the JS console that the app is collecting some kind of telemetry about me and sending it somewhere! Noooo... ! How do I disable it?
einpoklum's user avatar
  • 9,854
1 vote
1 answer
56 views

Removing all identifying info before sharing a copy of an excel sheet on a blog

There is an Excel Workbook I have created which I want to share on a blog page of mine (it's a static page created on github.io) What is the best way to share an excel Workbook? Should I just provide ...
user93353's user avatar
  • 583
0 votes
1 answer
85 views

Privacy protection while sharing an AWS account [closed]

I am thinking of getting an AWS account for hosting some hobby bots of mine. I have an online collaborater also in my hobby - we don't know each other personally not even our real names. Mainly ...
user93353's user avatar
  • 583
-3 votes
1 answer
79 views

Hiding a folder from the app called everything

I live in a family of mostly adult people who tend to check my laptop for any games or such, I've been hiding. I have a brother too who keeps checking my computer from time to time. I want to hide my ...
Prajwal Turkar's user avatar
0 votes
1 answer
748 views

How to react to an empty contact request on Signal-app of unknown origin and just with a "bin" file attached?

I am totally new to Signal messenger. I have just received a contact request, without a text, and just with a bin file of 13 KB in the attachment. I do not know the strange nickname which is 4-letters ...
questionto42's user avatar
  • 2,423
1 vote
0 answers
162 views

Chrome ignoring Window network DNS settings

I had found the answer at Why is Chromium bypassing /etc/hosts and dnsmasq? but it's outdated and instructions on its answers aren't working anymore. I have a local BIND DNS server, where I have lots ...
Hikari's user avatar
  • 317
0 votes
0 answers
62 views

Where do you find the file lists that Microsoft collects from your system?

System -> Update & Security -> Windows security (on the left) -> Virus & threat protection (on the right) -> Manage settings (under Virus & threat protection settings on the right) ...
john stamos's user avatar
-1 votes
2 answers
2k views

Avoid: Getting duplicate MAC address, with MAC address randomizer?

First of, a little context as to why I ask this question: I'm currently researching how I can get more "anonymous" online, not because I'm doing anything I need to hide, but simply because I value my ...
LeeSwaggers's user avatar
-2 votes
1 answer
133 views

MAC Address Connection with Purchase Info [closed]

Other questions on this forum have made it clear that the MAC address is not mostly not visible outside the local area network. I want to dig a little deeper about this. When one buys a tablet or ...
Marty F's user avatar
3 votes
0 answers
383 views

Is the new Firefox Content Blocking similar to Ghostery? [closed]

I have been using the Ghostery plugin with Firefox for a while now as my main tracking and ad blocker. I've noticed that the new Firefox 63 also has content blocking. Do I no longer need Ghostery ...
Rozgonyi's user avatar
  • 131
0 votes
3 answers
266 views

Cautionary steps before computer repair: How to wipe everything from SSD of dead computer except for OS

After moving my PC build inches, my PC somehow refuses to boot. I can't diagnose what problem is specifically happening to the computer, so I plan on going to a PC repair shop to have them diagnose ...
Adam Lee's user avatar
  • 133
1 vote
0 answers
151 views

How to automatically remove all meta data from file(s) using Linux OS?

On daily basis dozen of files arrive at my virtual desktop and they find their way to their next destination on: Cloud mailbox shared_folders mobile_devices etc I have noticed that some of them ...
Max's user avatar
  • 111
1 vote
1 answer
808 views

Cookie consent vs browser setting priority

Background info This question is about the functional implications of the "EU cookie law" in browsers. General Data Protection Regilation (GDPR) is implemented in EU starting from May 2018 ...
Art Gertner's user avatar
  • 7,309
4 votes
1 answer
3k views

Trustworthiness of OpenNIC DNS servers

Although Google's 8.8.8.8 DNS server is a popular alternative DNS server to the ones provided by your ISP, the privacy implications are too bothersome for me. While looking into privacy respecting ...
Huckle's user avatar
  • 568
49 votes
8 answers
13k views

How to mitigate any privacy-related risks associated with taking your laptop for repair? [duplicate]

Either my fan or my battery on my refurbished laptop is malfunctioning and it frequently overheats and shuts itself down. I wasn't able to determine the culprit and thought it best to show my laptop ...
user51309's user avatar
  • 583
0 votes
0 answers
170 views

How restrict cloud storage PC applications to access other than "home" folders?

There is many cloud storage services like Google Drive, OneDrive, Dropbox, iDrive, etc. which install own companion application on PC to easy access their services from computer desktop. This ...
Tempuser's user avatar
0 votes
1 answer
2k views

Want to get rid of "website data" on Safari, and for good

Trying to solve a particular problem with Safari, I went to Preferences->Privacy->Manage Website data, where I found a list of websites that have stored data on my machine. I hit the button ...
bob.sacamento's user avatar
1 vote
1 answer
5k views

How do I remove Facebook's tyrranical "Facebook Comments Plugin"? [closed]

Some websites I go to using Chrome, there is a comment section in which you can post with your facebook account. Under it, it says "Facebook Comments Plugin". For some bizarre reason, this comments ...
user56834's user avatar
  • 157
3 votes
1 answer
5k views

Ghostery extension exception: 'failed to redirect a network request to ... because another extension (Privacy Badger) redirected it to ...'

I have installed both Ghostery and Privacy Badger extension in google chrome. This error (as seen in the screenshot) This extension failed to redirect a network request to data:application/...
Anthony Kong's user avatar
  • 5,088
14 votes
5 answers
80k views

How to set up a Chromecast without logging in to Google Home?

I have a Chromecast audio and the Google Home app now requires location access and for you to log in. I don't want to give it either, and therefore it does not help me set up the device. There is no ...
YetAnotherRandomUser's user avatar
0 votes
1 answer
3k views

How do websites uniquely identify your computer even with other computers on your network?

There's a site that I visit that shows a captcha every 2 hours or so and I was just wondering how they did it. NOTE: I am not trying to circumvent it because the rewards of doing so would be next to ...
Byte11's user avatar
  • 101
0 votes
1 answer
104 views

Why do we even use ad blockers at home when most home routers have filter lists?

I started pretty much like the rest of us with regular ad blocking extensions. But there is arguably a performance drop due to the additional checks each time you load a page. I then started using ...
AdHominem's user avatar
  • 468
1 vote
3 answers
1k views

Can ARP cache poisoning be done from WAN side of home router?

Is it possible to initiate ARP cache poisoning attack by spoofing the ARP requests from WAN side of router? instead of attacking from LAN Side?
OT10's user avatar
  • 47
1 vote
2 answers
8k views

is there a way to prevent data in a flash drive from being copied [duplicate]

I want to give a USB flash drive to a friend but I don't want him to copy the data in USB or add anything to it is it possible so he could only read the files without the ability to do anything else?
Mehdi Zibout's user avatar
0 votes
1 answer
99 views

How to protect access to a folder or a disk-drive from all platforms (OSs) ?

I have an external hard disk which I want to protect access to (some of) its data (using password or a specific authentification procedure). (I would prefer folder protection rather that a full disk ...
reaffer's user avatar
  • 125
0 votes
1 answer
75 views

Administrative shares

I found out recently that work is scanning employee e-mails and accessing our Laptops/Desktops through Administrative shares. I have nothing to hide but see this as an invasion of privacy and liberty. ...
DJReferee's user avatar
-3 votes
1 answer
615 views

How to prevent the operating system from accessing internet while still enabling web browsing?

What would be the best way to effectively isolate a computer from the internet so that especially the operating system cannot access the net, while still allowing the user to browse the web using some ...
coward88's user avatar
0 votes
0 answers
8k views

Why do some Chrome VPN extensions not work?

I have tried a number of free Chrome VPN extensions on a Windows desktop PC. I found all were successful in providing a different IP address. However, with almost half of the VPNs, I worryingly ...
Goto10's user avatar
  • 603
1 vote
1 answer
663 views

How do I surf via a VPN and have a home VPN endpoint?

Here's my issue. Previously I had my Gargoyle-based router operating as a VPN server so I could connect to home whilst away. This proved very handy. Due to changes in local snoopery I have changed ...
Mark's user avatar
  • 123
1 vote
2 answers
813 views

How can i bypass/protect myself from ransomware like ctb-locker? [duplicate]

Recently while using my system for testing I got my machine infected with a malware, My system gets displayed with the following screen : While browsing internet with screenshot i found that its ...
BlueBerry - Vignesh4303's user avatar
0 votes
1 answer
995 views

Can cookies read information from different Firefox profiles?

I've been working now for a couple of years by splitting my web activity in different firefox profiles. I use one only for gmail, another one for general browsing and some others for spotify and web-...
pedrosaurio's user avatar
2 votes
2 answers
18k views

What type of information does HTTPs make private from an ISP? [duplicate]

How private is HTTPs to an ISP? For example, Can my ISP know the entire URL (Not only the domain) while connecting to a website with HTTPs? Can my ISP see images loaded through a website connected to ...
Karolinger's user avatar
0 votes
1 answer
101 views

Firefox: what is the parameter to know if the cache will be cleared when closing the browser?

in the list of paramters after outputting about:config, what is the parameter to know if the cache will be cleared when closing the browser?
tirenweb's user avatar
  • 1,359
3 votes
1 answer
3k views

What can I find out about an embedded image in my received e-mail message?

I believe an embedded image in a gmail message that I have received is actually a tracking link such as those used by contactmonkey. Is there a way for me to find information about the image without ...
J. Win.'s user avatar
  • 145
0 votes
1 answer
183 views

Mac OS X Disk Utility doent get my external drives ready for removal

Mac OS X Disk Utility doent get my external drives ready for removal. In windows, clicking safely remove hardware from the taskbar stops the spinning of my external drive, but in my Mac OS X Yosemite,...
Me Wowlol's user avatar
  • 265
0 votes
2 answers
587 views

Macbook Pro - remote accessing inquiry

I just bought a used second-hand Macbook Pro, it is already functioning with OS and stuffs and a lot of apps. Im already using it, I didn't have it reformatted or whatsoever, so the previous owners ...
Me Wowlol's user avatar
  • 265
1 vote
0 answers
32 views

How do I shield my Windows contacs from 3rd party software?

On Windows 7 I am using the onboard Windows contacts solution for all my contacts that contain a lot of personal information which I dont want to spread. Are those contacts read-protected against ...
sir_brickalot's user avatar
1 vote
0 answers
358 views

Is it possible to know which content was blocked by Tracking Protection in IE?

I'm using many Tracking Protection Lists in my Internet Explorer (IE11 if that matters). In this case if I visit a website that has part of its content block IE shows a blue icon where I can see that ...
Vitor Canova's user avatar
15 votes
1 answer
3k views

Chrome lock profile on exit

As described here, with the new Chrome, you can lock your profile by simply clicking on the lock icon. Do you think it is possible to automatically lock the profile on exit?
Jess Stone's user avatar
1 vote
0 answers
1k views

How to prevent accidental emails sending to clients as CC? (Instead of BCC)

I'm trying to figure out how to prevent accidental leak of clients emails addresses when employee pastes them to CC instead of BCC. Is it a way to restrict sending cc mails to addresses from ...
Piotr Nawrot's user avatar
-7 votes
2 answers
181 views

What can i use to make sure nothing is saved on my computer, history,ect [closed]

I read a lot of yaoi and i'm looking for a way that no one can trace me back with history or a service provider ratting me out, i'm not sure if incognito is safe enough.
Jim's user avatar
  • 1
0 votes
2 answers
2k views

Protect file or folder from copy-paste

I want to make a folder on a local computer and prevent it from being copied to another machine. For example, I have a folder with one file in it, so what should I adjust in order to prevent users of ...
user3244442's user avatar

15 30 50 per page