My presentation titled "Browsers eat data quality for breakfast" from SuperWeek 2020.
The presentation introduces the "tracking protection / prevention / blocking" mechanisms implemented in the major browsers.
The information comes from the www.cookiestatus.com service.
My talk from Digital Elite Day 2020 (Conversion Elite track).
I go over the main changes in browser tracking protections since as early as 2003 (Safari version 1). Then I discuss the impact these tracking protections have on digital analytics, advertising, and experimentation.
Web3 Security: The Blockchain is Your SIEMTal Be'ery
2021’s hottest new tech term, according to TechCrunch, was “definitely Web3”. Web3, as its name suggests, is considered by many as the future of the internet: decentralized, permissionless, and based on modern blockchain technology. While Web3 might have a bright future, it’s in the middle of growing pains: A number of Web3 apps were hacked in 2021, leading to theft of cryptoassets valued at hundreds of millions of US Dollars. In this talk we will present Web3 app technology, dissect new attack surfaces, and suggest new and exciting defense mechanisms.
First, we will dive into the technical details of Web3 applications, showing how Web3 technology opens new attack surfaces by moving app functionality onto the blockchain. We will then analyze these newly-exposed attack surfaces by reviewing a few examples we’ve discovered “in the wild.”
While Web3 exposes new attack surfaces, it also provides novel detection opportunities. Specifically, the public and transparent nature of the blockchain allows security researchers to immediately explore full details of any attack and, as a result, leads to quick and thorough discoveries. This is a paradigm shift in security research, as current practices only allow a few to learn actual attack details, only some portions of which are shared publicly. This shift in transparency allowed us to independently explore the aforementioned attacks.
Furthermore, we believe we can do even better and go beyond rapid post-mortem reports. We will show how the same raw data we had previously used for a post-mortem analysis can be analyzed in real-time (or even ante factum by “taking a peek” into the blocks that have yet to be mined) to detect and even prevent attacks. This capability is enabled by the online nature of the blockchain and its inherent block time delays. In fact, we can import, with relevant modifications, many of the principles and learnings of current web defenses, including Web Application Firewall (WAF) into the realm of blockchain. By doing so, we introduce a scheme for a Web3 Application Firewall (W3AF) which can greatly improve Web3 security and blockchain-based apps.
Third-Party Cookie Loss Masterclass 1: So Your Cookie Crumbled, What's Next?Tealium
This deck is from the first session in our masterclass series on Preparing for Life Beyond the Third-Party Cookie. Check it out to see actionable ways to start preparing today and tips for switching to a first-party data strategy.
Be sure to check out the on-demand sessions at:
https://tealium.com/master-class-preparing-for-the-third-party-cookie-loss/
In this presentation, you will learn what is cryptojacking? How to detect, prevent & recover from it? What are the latest news related to cryptojacking?
This document discusses using BigQuery and Dataflow for ETL processes. It explains loading raw data from databases into BigQuery, transforming the data with Dataflow, and writing the results. It also mentions pricing of $5 per terabyte for BigQuery storage and notes that Dataflow provides virtual CPUs and RAM. Finally, it includes a link about performing ETL from relational databases to BigQuery.
Web3 is a proposed next phase of the internet that utilizes blockchain technology to decentralize the web. It aims to give users ownership over their data and digital assets through the use of cryptocurrencies, NFTs, DAOs, and decentralized applications. While advocates argue Web3 will democratize the web and create new economies, others are skeptical due to technical challenges, environmental concerns, and the proliferation of speculation and privacy issues. As Web3 continues to develop, companies are exploring opportunities while also weighing the risks of this emerging landscape.
The document provides instructions for cracking various online accounts using different tools. It begins by explaining basics of account cracking like what a combo is and why proxies are needed. It then provides step-by-step tutorials for using the cracking tools SentryMBA, STORM, and SNIPR to crack accounts on websites like WWE, Spotify, and Netflix. It also discusses related topics like gathering proxies, decrypting hashes, finding combos, and staying safe while cracking accounts.
Web 3.0 or Decentralised Web to revolutionise the world of Internet Era through Blockchain, Big Data Analytics and Artificial Intelligence.
There has been a buzz around the Web 3.0 and the disruption it will bring to the Industry, but only a few know actually why it spawned and what is it about to transform. Let us travel back in time to understand and examine its predecessors - Web 1.0 and 2.0
The Blockchain, the Internet of Things, Advanced analytics, and Artificial Intelligence are potent technologies that will have a profound effect on society. They will take us much further into this new world of the information age as power shifts in a radical way from people in hierarchical institutions to automated networks and the algorithms that can coordinate in the Web 3.0 era.
The Web 3.0 knowledge management should give rise to an exciting and game-changing environment - the Social Semantic Web. However, still, the technology is in the early stages, but if you have used the Google search in the recent times know that the Google has used natural language to find the answer to your question. Hence you are already experiencing the revolutionary benefits of the next chapter in the story of the "World Wide Web (WWW)."
My talk from Digital Elite Day 2020 (Conversion Elite track).
I go over the main changes in browser tracking protections since as early as 2003 (Safari version 1). Then I discuss the impact these tracking protections have on digital analytics, advertising, and experimentation.
Web3 Security: The Blockchain is Your SIEMTal Be'ery
2021’s hottest new tech term, according to TechCrunch, was “definitely Web3”. Web3, as its name suggests, is considered by many as the future of the internet: decentralized, permissionless, and based on modern blockchain technology. While Web3 might have a bright future, it’s in the middle of growing pains: A number of Web3 apps were hacked in 2021, leading to theft of cryptoassets valued at hundreds of millions of US Dollars. In this talk we will present Web3 app technology, dissect new attack surfaces, and suggest new and exciting defense mechanisms.
First, we will dive into the technical details of Web3 applications, showing how Web3 technology opens new attack surfaces by moving app functionality onto the blockchain. We will then analyze these newly-exposed attack surfaces by reviewing a few examples we’ve discovered “in the wild.”
While Web3 exposes new attack surfaces, it also provides novel detection opportunities. Specifically, the public and transparent nature of the blockchain allows security researchers to immediately explore full details of any attack and, as a result, leads to quick and thorough discoveries. This is a paradigm shift in security research, as current practices only allow a few to learn actual attack details, only some portions of which are shared publicly. This shift in transparency allowed us to independently explore the aforementioned attacks.
Furthermore, we believe we can do even better and go beyond rapid post-mortem reports. We will show how the same raw data we had previously used for a post-mortem analysis can be analyzed in real-time (or even ante factum by “taking a peek” into the blocks that have yet to be mined) to detect and even prevent attacks. This capability is enabled by the online nature of the blockchain and its inherent block time delays. In fact, we can import, with relevant modifications, many of the principles and learnings of current web defenses, including Web Application Firewall (WAF) into the realm of blockchain. By doing so, we introduce a scheme for a Web3 Application Firewall (W3AF) which can greatly improve Web3 security and blockchain-based apps.
Third-Party Cookie Loss Masterclass 1: So Your Cookie Crumbled, What's Next?Tealium
This deck is from the first session in our masterclass series on Preparing for Life Beyond the Third-Party Cookie. Check it out to see actionable ways to start preparing today and tips for switching to a first-party data strategy.
Be sure to check out the on-demand sessions at:
https://tealium.com/master-class-preparing-for-the-third-party-cookie-loss/
In this presentation, you will learn what is cryptojacking? How to detect, prevent & recover from it? What are the latest news related to cryptojacking?
This document discusses using BigQuery and Dataflow for ETL processes. It explains loading raw data from databases into BigQuery, transforming the data with Dataflow, and writing the results. It also mentions pricing of $5 per terabyte for BigQuery storage and notes that Dataflow provides virtual CPUs and RAM. Finally, it includes a link about performing ETL from relational databases to BigQuery.
Web3 is a proposed next phase of the internet that utilizes blockchain technology to decentralize the web. It aims to give users ownership over their data and digital assets through the use of cryptocurrencies, NFTs, DAOs, and decentralized applications. While advocates argue Web3 will democratize the web and create new economies, others are skeptical due to technical challenges, environmental concerns, and the proliferation of speculation and privacy issues. As Web3 continues to develop, companies are exploring opportunities while also weighing the risks of this emerging landscape.
The document provides instructions for cracking various online accounts using different tools. It begins by explaining basics of account cracking like what a combo is and why proxies are needed. It then provides step-by-step tutorials for using the cracking tools SentryMBA, STORM, and SNIPR to crack accounts on websites like WWE, Spotify, and Netflix. It also discusses related topics like gathering proxies, decrypting hashes, finding combos, and staying safe while cracking accounts.
Web 3.0 or Decentralised Web to revolutionise the world of Internet Era through Blockchain, Big Data Analytics and Artificial Intelligence.
There has been a buzz around the Web 3.0 and the disruption it will bring to the Industry, but only a few know actually why it spawned and what is it about to transform. Let us travel back in time to understand and examine its predecessors - Web 1.0 and 2.0
The Blockchain, the Internet of Things, Advanced analytics, and Artificial Intelligence are potent technologies that will have a profound effect on society. They will take us much further into this new world of the information age as power shifts in a radical way from people in hierarchical institutions to automated networks and the algorithms that can coordinate in the Web 3.0 era.
The Web 3.0 knowledge management should give rise to an exciting and game-changing environment - the Social Semantic Web. However, still, the technology is in the early stages, but if you have used the Google search in the recent times know that the Google has used natural language to find the answer to your question. Hence you are already experiencing the revolutionary benefits of the next chapter in the story of the "World Wide Web (WWW)."
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
This document provides an overview of a presentation by Cloudflare on network transformation and how to stay secure while migrating to the cloud. The presentation discusses network security challenges, an overview of Cloudflare's solutions, and customer stories from the financial services, manufacturing and e-commerce industries. Topics that will be covered include network security, Cloudflare's global cloud platform, how digital transformation is changing organizations, the need for network transformation, and how Cloudflare enables secure access and reduces costs when migrating applications and networks to the cloud. Customer examples are then provided from a financial services company, a manufacturing company, a cosmetics company, and a vehicle manufacturer that discuss how Cloudflare helped improve their security,
The document discusses mobile hacking and identification techniques for encrypted data. It covers mobile technology threats like Bluetooth, WiFi, cracked apps, and data storage. It then describes mobile hacking tools like PWN PAD, PWN Phone, and Linux chroot that can be used for wireless attacks, networking, and Android hacking. The conclusion recommends using firewalls, antivirus software, keeping apps up to date, avoiding cracked apps, and using security locks to help defend against these mobile threats.
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
The document discusses using blockchain technology to increase transparency and tracking in the winemaking process. It proposes creating an immutable record of information on cultivation, winemaking steps, distribution, and consumer interactions. This would allow consumers to access certified information through smart labels, and help producers increase profits through higher prices for guaranteed quality and transparency. The first application of a wine blockchain by EY tracked data from a vineyard in 4 weeks, receiving positive media coverage.
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Sirius
This document provides best practices for implementing multi-factor authentication (MFA) for stronger security. It discusses how MFA provides an additional layer of security beyond passwords alone. The document recommends understanding your requirements, evaluating solutions based on integration, user experience and flexibility, assessing users and applications, choosing appropriate authentication factors and distribution methods, taking mobile security measures, and delivering MFA through a risk-based and user-friendly approach to prevent stolen password attacks while balancing security and usability.
This document discusses the history and techniques of phishing attacks. It notes that phishing originated in the 1990s as a way to steal AOL account passwords but has since evolved to target banks, PayPal, and other financial institutions to steal credit card numbers and bank account credentials. Modern phishing uses official-looking websites, email messages, links, and social engineering to trick users into providing sensitive information. The document recommends ways for individuals and businesses to protect themselves, including being wary of unsolicited messages requesting personal details, verifying website URLs, keeping software updated, and reporting suspicious activity.
Malicious Url Detection Using Machine Learningsecurityxploded
This document discusses using machine learning to detect malicious URLs. It proposes extracting various features from URLs, including querying blacklists, domain registration information, host properties, and lexical features of the URL. These features are then used to train classifiers like logistic regression to distinguish benign from malicious URLs. The approach is shown to achieve over 86.5% accuracy in detecting malicious URLs using a diverse set of over 18,000 features, performing better than blacklists alone. Future work includes scaling the approach for deployment and incorporating webpage content analysis.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
A content delivery network or content distribution network (CDN) is a large distributed system of servers deployed in multiple data centers across the Internet. The goal of a CDN is to serve content to end-users with high availability and high performance. CDNs serve a large fraction of the Internet content today, including web objects (text, graphics and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social networks.
Este documento fornece um resumo dos principais conceitos relacionados a honeypots e honeynets. Explica o que são honeypots e como eles funcionam como armadilhas digitais para detectar invasores de rede. Também descreve os tipos de sistemas de detecção de intrusos como NIDS e HIDS, além de ferramentas como Snort, iptables e softwares como Deception Toolkit, Honeyd e Specter que podem ser usados para criar e gerenciar honeypots.
MoEngage_eTail Europe Presentation London 2022.pdfMoEngage Inc.
Due to the limitations of current platforms, Customer Engagement has been forced to become more campaign-driven. They don't provide insights, forcing you to run campaigns on guesswork. Humans, on the other hand, are highly complex creatures. Millions of your customers have a wide range of preferences. Brands must be customer-centric and proactive in their approach to catering to these distinct preferences to gain trust.
So, how do you delight customers if you lack meaningful insights? Our VP for EMEA, Jason Smith, discusses how brands can connect with their customers more personally by using an insights-led approach.
Blockchain technology allows data to be stored and exchanged on a peer-to-peer network in a secure and decentralized manner without intermediaries. It works by validating transactions and adding them as blocks to an immutable blockchain that is shared across all nodes in the network. Blockchains use cryptography to ensure data integrity and prevent alteration of past records. Real-world applications of blockchain include powering cryptocurrencies like Bitcoin, implementing smart contracts, building decentralized applications, and developing government services like in Dubai.
This document discusses optimizing images and video for fast delivery on mobile websites. It provides 4 simple optimizations for images: quality, format, sizing, and lazy loading. For video, it recommends stripping audio from silent videos, resizing videos for mobile, and starting video streaming at lower bitrates. Testing tools mentioned include WebPageTest, HTTPArchive, ImageMagick, and libraries for lazy loading and responsive images. The overall message is that images and video can be both beautiful and fast with the right optimizations.
This document discusses optimizing images and video for fast delivery on mobile websites. It provides four simple optimizations: adjusting image quality, format, sizing, and lazy loading. SVG, WebP and responsive images are recommended over other formats. Videos should be resized, have audio removed if unneeded, and only download what will be displayed. Background videos especially should be optimized for mobile screens. Network conditions and customer needs like data savings should also be considered. Tools like ImageMagick, Cloudinary and WebPageTest can help with optimizations.
Network Transformation: What it is, and how it’s helping companies stay secur...Cloudflare
This document provides an overview of a presentation by Cloudflare on network transformation and how to stay secure while migrating to the cloud. The presentation discusses network security challenges, an overview of Cloudflare's solutions, and customer stories from the financial services, manufacturing and e-commerce industries. Topics that will be covered include network security, Cloudflare's global cloud platform, how digital transformation is changing organizations, the need for network transformation, and how Cloudflare enables secure access and reduces costs when migrating applications and networks to the cloud. Customer examples are then provided from a financial services company, a manufacturing company, a cosmetics company, and a vehicle manufacturer that discuss how Cloudflare helped improve their security,
The document discusses mobile hacking and identification techniques for encrypted data. It covers mobile technology threats like Bluetooth, WiFi, cracked apps, and data storage. It then describes mobile hacking tools like PWN PAD, PWN Phone, and Linux chroot that can be used for wireless attacks, networking, and Android hacking. The conclusion recommends using firewalls, antivirus software, keeping apps up to date, avoiding cracked apps, and using security locks to help defend against these mobile threats.
Blockchain technology is being touted as the Next Big Thing, seemingly capable of great feats of strength and perhaps even curing the common cold. But what exactly is it and how could it contribute to a security program? This session will describe how blockchain works, define its value proposition, and identify specific use cases where blockchain makes sense and some where it doesn't. Along the way, we will discuss similar capabilities and technologies that accomplish the objectives.
The document discusses using blockchain technology to increase transparency and tracking in the winemaking process. It proposes creating an immutable record of information on cultivation, winemaking steps, distribution, and consumer interactions. This would allow consumers to access certified information through smart labels, and help producers increase profits through higher prices for guaranteed quality and transparency. The first application of a wine blockchain by EY tracked data from a vineyard in 4 weeks, receiving positive media coverage.
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...Sirius
This document provides best practices for implementing multi-factor authentication (MFA) for stronger security. It discusses how MFA provides an additional layer of security beyond passwords alone. The document recommends understanding your requirements, evaluating solutions based on integration, user experience and flexibility, assessing users and applications, choosing appropriate authentication factors and distribution methods, taking mobile security measures, and delivering MFA through a risk-based and user-friendly approach to prevent stolen password attacks while balancing security and usability.
This document discusses the history and techniques of phishing attacks. It notes that phishing originated in the 1990s as a way to steal AOL account passwords but has since evolved to target banks, PayPal, and other financial institutions to steal credit card numbers and bank account credentials. Modern phishing uses official-looking websites, email messages, links, and social engineering to trick users into providing sensitive information. The document recommends ways for individuals and businesses to protect themselves, including being wary of unsolicited messages requesting personal details, verifying website URLs, keeping software updated, and reporting suspicious activity.
Malicious Url Detection Using Machine Learningsecurityxploded
This document discusses using machine learning to detect malicious URLs. It proposes extracting various features from URLs, including querying blacklists, domain registration information, host properties, and lexical features of the URL. These features are then used to train classifiers like logistic regression to distinguish benign from malicious URLs. The approach is shown to achieve over 86.5% accuracy in detecting malicious URLs using a diverse set of over 18,000 features, performing better than blacklists alone. Future work includes scaling the approach for deployment and incorporating webpage content analysis.
Presentation by DHS S&T at the NY Blockchain 360 Conference regarding Blockchain's relevance to the Homeland Security Enterprise. Results of security and privacy research and development over the last 2+ years and next steps.
สไลด์ประกอบเวที Open Forum: Cybersecurity Knowledge Sharing Series ครั้งที่ 3 หัวข้อ THE ESSENTIAL ELEMENT OF YOUR SECURITY. ในวันพุธที่ 16 พฤษภาคม 2561 เวลา 12.45–16.30 น. ณ ห้อง Open Forum ชั้น 21 ETDA
A content delivery network or content distribution network (CDN) is a large distributed system of servers deployed in multiple data centers across the Internet. The goal of a CDN is to serve content to end-users with high availability and high performance. CDNs serve a large fraction of the Internet content today, including web objects (text, graphics and scripts), downloadable objects (media files, software, documents), applications (e-commerce, portals), live streaming media, on-demand streaming media, and social networks.
Este documento fornece um resumo dos principais conceitos relacionados a honeypots e honeynets. Explica o que são honeypots e como eles funcionam como armadilhas digitais para detectar invasores de rede. Também descreve os tipos de sistemas de detecção de intrusos como NIDS e HIDS, além de ferramentas como Snort, iptables e softwares como Deception Toolkit, Honeyd e Specter que podem ser usados para criar e gerenciar honeypots.
MoEngage_eTail Europe Presentation London 2022.pdfMoEngage Inc.
Due to the limitations of current platforms, Customer Engagement has been forced to become more campaign-driven. They don't provide insights, forcing you to run campaigns on guesswork. Humans, on the other hand, are highly complex creatures. Millions of your customers have a wide range of preferences. Brands must be customer-centric and proactive in their approach to catering to these distinct preferences to gain trust.
So, how do you delight customers if you lack meaningful insights? Our VP for EMEA, Jason Smith, discusses how brands can connect with their customers more personally by using an insights-led approach.
Blockchain technology allows data to be stored and exchanged on a peer-to-peer network in a secure and decentralized manner without intermediaries. It works by validating transactions and adding them as blocks to an immutable blockchain that is shared across all nodes in the network. Blockchains use cryptography to ensure data integrity and prevent alteration of past records. Real-world applications of blockchain include powering cryptocurrencies like Bitcoin, implementing smart contracts, building decentralized applications, and developing government services like in Dubai.
This document discusses optimizing images and video for fast delivery on mobile websites. It provides 4 simple optimizations for images: quality, format, sizing, and lazy loading. For video, it recommends stripping audio from silent videos, resizing videos for mobile, and starting video streaming at lower bitrates. Testing tools mentioned include WebPageTest, HTTPArchive, ImageMagick, and libraries for lazy loading and responsive images. The overall message is that images and video can be both beautiful and fast with the right optimizations.
This document discusses optimizing images and video for fast delivery on mobile websites. It provides four simple optimizations: adjusting image quality, format, sizing, and lazy loading. SVG, WebP and responsive images are recommended over other formats. Videos should be resized, have audio removed if unneeded, and only download what will be displayed. Background videos especially should be optimized for mobile screens. Network conditions and customer needs like data savings should also be considered. Tools like ImageMagick, Cloudinary and WebPageTest can help with optimizations.
This document discusses optimizing images and video delivery for mobile websites. It provides 4 simple optimizations for images: quality, format, sizing, and lazy loading. For image quality, it recommends 85% quality for most images. For format, it suggests using webp, svg, and jpeg. For sizing, it discusses using responsive images at different breakpoints. For lazy loading, it notes the performance benefits. It also covers optimizing video delivery through formats, sizing, preloading, and streaming using adaptive bitrates in the manifest file. The goal is to reduce file sizes, speed up loading, and improve the user experience on mobile.
Chrome Extensions: Masking risks in entertainmentEduardo Chavarro
Chorme extensions are plugins for the Chrome web browser that add functionalities to the browsing experience, but can also include risks like information leakage, unauthorized PII access or profiling. Let's see what are some of these applications hiding.
This document discusses optimizing images for faster page loads. It recommends four simple optimizations: reducing image quality to 85%, using smaller file formats like WebP and SVG, sizing images appropriately through responsive images, and lazy loading images not initially visible. Implementing these optimizations can significantly reduce page weight and load times. The document provides examples and tools for each technique and data on their real-world impacts on mobile sites.
This document discusses optimizing images and video for mobile delivery. It begins by noting that images and video make up 75% of web content. It then outlines four simple optimizations for images: quality, format, sizing, and lazy loading. For each optimization, it provides examples and data on usage. It finds that adjusting quality to 85%, using responsive images, and lazy loading can significantly improve performance. For video, it discusses startup time, buffering, file size reduction techniques like removing audio and resizing, and delivery via streaming. The overall message is that minor optimizations to images and especially video can have large impacts on mobile performance and user experience.
This document provides tips for optimizing images and video delivery on mobile websites to improve performance. It discusses reducing image file sizes through techniques like lowering quality levels, using optimized formats like WebP and SVG, resizing images responsively, and lazy loading images. For video, it recommends preloading, stripping audio from silent videos, resizing videos for mobile, and auditing third party videos. Testing and automation tools are also referenced. The overall message is that images and video can be both beautiful and fast with the right optimizations.
This document provides an overview of optimizing images and video for delivery on mobile devices. It discusses four main optimizations for images: quality, format, sizing, and lazy loading. For quality, it recommends using 85% quality for JPEG images. For format, it suggests using formats like WebP, SVG and responsive images. For sizing, it discusses generating responsive image sizes. For lazy loading, it covers techniques to delay loading images until they are visible. For video, it discusses optimizations like preloading, resizing video, removing audio from non-playing videos, and optimizing video delivery through techniques like manifest files and adaptive bitrate streaming.
The document discusses optimizing images for fast loading on mobile websites. It provides 4 simple optimizations: 1) reducing image quality, 2) using optimized formats like WebP and SVG, 3) proper sizing of images for different screen sizes, and 4) lazy loading images that are not immediately visible. The document shows how these techniques can significantly reduce image file sizes and page load times based on analyzing millions of mobile sites. It also discusses alternatives to animated GIFs like using video formats and preview images to improve performance.
This document discusses optimizing images and video for fast delivery on mobile devices. It begins by outlining how delays in loading content can negatively impact users and business metrics. It then provides recommendations for optimizing four aspects of images: quality, format, sizing, and lazy loading. Specific techniques are presented for each along with data showing their real-world impact. Video delivery optimization is also covered, including strategies to improve startup times. The document concludes by stating that images and video can be both beautiful and fast with the right optimizations.
This document discusses optimizing images for fast page loads on mobile websites. It outlines four simple image optimizations: 1) reducing image quality to 85%, 2) using optimized formats like WebP and SVG, 3) sizing images appropriately for different screen sizes through responsive images, and 4) lazy loading images below the fold. The document provides examples and data showing how these techniques can significantly reduce page load times and data usage. It encourages testing optimizations using tools like WebPageTest and analyzing real-world usage from the HTTP Archive.
Amp by Google: The Present And Future Of Quick Content DeliveryRaunak Hajela
One of the most important things for a person who’s searching for a piece of information is speed. If they don’t find what they are looking for within a couple of seconds they just close the website and look for another alternative. This might not seem a great problem but when your business is dependent on search traffic and you make money off ads or sell a product, every visitor is worth a lot, you can’t simply afford to lose someone.
To cater this problem Google launched Accelerated Mobile Pages or AMP which is an opensource technology that follows standard HTML markup and optimized JavaScript in order to deliver content at lightning fast speeds. Earlier it was rolled out to News & Media websites but today you can take advantages of this technology on almost any website. This presentation is about how you can easily make your WordPress sites amp optimized, the pros cons and future of this amazing technology.
This document provides an overview of optimizing images and video delivery for mobile websites. It discusses four image optimization techniques: reducing quality to 85%, using formats like WebP and SVG, resizing images responsively, and lazy loading. It also covers optimizing video delivery through techniques like preloading strategically, reducing background video size, using third-party players carefully, and providing multiple bitrate streams in manifest files. The goal is to reduce data usage and delays to improve the mobile user experience.
Rendering SEO Manifesto - Why we need to go beyond JavaScript SEOOnely
Want to make sure that your content gets properly accessed by search engines and ranks high? Look no further! In this beginner-friendly introduction to batch-optimized rendering, Bartosz will guide you through how Google is rendering websites on a large scale. You’ll gain groundbreaking insights based on Google’s patents and documentation. Join Bartosz to get a new perspective on technical SEO and use it to get more traffic!
Devfest Siberia Fast and Beautiful Images and VideoDoug Sillars
This document provides an overview of optimizing images and video delivery for mobile websites. It discusses four simple image optimizations: adjusting quality, choosing optimal file formats like WebP and SVG, resizing images responsively, and lazy loading images. It also covers optimizing video delivery through techniques like preloading strategically, resizing background videos appropriately, minimizing third party dependencies, and configuring adaptive bitrate streaming. The goal is to reduce payload sizes and improve load performance.
The document discusses optimizing images and video for fast delivery on websites. It provides tips for improving image quality, format, sizing and lazy loading. For video, it discusses optimizing startup time by preloading strategically and balancing network usage. Testing tools mentioned include WebPageTest, HttpArchive, ImageMagick and SSIM. The goal is to make images and video both beautiful and fast loading.
Doug Sillars discusses optimizing images and video delivery for fast loading on mobile. He provides 4 simple optimizations for images: adjusting quality, format, sizing through responsive images, and lazy loading. For video, he examines startup delays and how to balance network load through adaptive bitrate streaming. Proper preloading and avoiding 3rd party interference can improve video start. Tools like WebPageTest and ImageMagick help optimize and measure performance.
Doug Sillars discusses optimizing image performance on websites. He outlines 4 simple optimizations: 1) reducing image quality, 2) using optimized formats like WebP and SVG, 3) sizing images appropriately, and 4) lazy loading images below the fold. Properly implementing these techniques can significantly improve page load times and reduce data usage. Sillars also provides tips on monitoring image usage in the wild and considerations for different network conditions and user expectations.
The document outlines technology upgrades and initiatives by a golf association including: transitioning to VOIP phone services to reduce costs; implementing online meeting software and cloud storage; and advancing online tee time registration. Other efforts were integrating accounting software, expanding educational resources online, increasing online scoring capabilities, using social media, tracking website analytics, and a player of the year points program. The upgrades aimed to save staff time and expenses while boosting the association's online presence and services.
- Images and video make up 75% of web content and can significantly impact page load speeds if not optimized properly
- Large file sizes, inefficient formats, and lack of responsive images are some of the key factors that slow down page loads
- Techniques like compression, responsive images, lazy loading, efficient formats like WebP and SVG, and optimizing delivery can help make images and video both beautiful and fast to load
Similar to Browser Tracking Protections - SuperWeek 2020 (20)
Server-side Tagging in Google Tag Manager - MeasureSummit 2020Simo Ahava
My presentation from MeasureSummit 2020.
I walk you through the key benefits and concerns of Server-side Tagging in Google Tag Manager, before wrapping up with an example of how SST lets you reduce client-side bloat.
For more details about Server-side Tagging, see this resource: https://www.simoahava.com/analytics/server-side-tagging-google-tag-manager/
You can't spell MEASURE without CUSTOMIZATIONSimo Ahava
The document discusses challenges and best practices for ensuring high quality data. It notes that data quality is an investment that requires expertise from both technical and business perspectives, as well as mature processes. It emphasizes the importance of communication structures, citing Conway's Law, and warns that complex data pipelines can introduce conflicts if not properly designed. It also stresses that individual data sources should not be viewed in isolation. Throughout it provides examples and potential issues to consider to continually improve data quality.
Essential Search Marketing Tweaks For Google Analytics And Google Tag ManagerSimo Ahava
Slides from my SMX Munich 2018 talk.
How to measure engagement with the web analytics tools at our disposal?
How to turn reports more meaningful for our particular organizational idiosyncracies and goals?
How to become more critical about the data that is spoon-fed to us by the default installations of our favorite tools?
Google Tag Manager - 5 years. What have we learned?Simo Ahava
Looking back on five years of Google Tag Manager. Has the tool changed? Have we? What's coming up in the next 5 years?
My talk at MeasureCamp #11 (London).
MeasureCamp IX (London) - 10 JavaScript Concepts for web analystsSimo Ahava
Here's my list of 10 JavaScript (related) concepts that I think all web analysts should understand at least on a basic level. A solid grasp of JavaScript is a base requirement for anyone working with the web browser.
Search Marketer's Toolkit for Google Tag Manager and Google AnalyticsSimo Ahava
My slides from the Searchlove Boston conference in May 2016. The presentation covers actionable tips and tricks for working with Google Tag Manager and Google Analytics.
Content Analytics - The Whys And Hows For Google AnalyticsSimo Ahava
These are my slides from SMX München 2016. Content engagement is a tricky thing to measure, especially how it changes over time, but in this article I give some ideas for how to enhance your content measurement process within your organization.
SuperWeek 2016 - Garbage In Garbage Out: Data Quality in a TMS WorldSimo Ahava
Simo Ahava discusses data quality and the importance of a data-driven process and culture. He advocates for breaking down silos between teams by implementing a shared data layer and involving stakeholders from all teams in iterative development through a definition of done that incorporates data tracking requirements. Empowering developers to facilitate data collection and analysis, and hiring hybrid profiles with both business and technical skills can also improve data quality.
Meaningful Data - Reaktor Breakpoint 2015Simo Ahava
Slides from my talk at Reaktor Breakpoint 2015 in Helsinki, Finland. The topic is Meaningful Data, and I use content engagement as an example of how to utilize Google Analytics reports to provide amazing insights with just a little customization.
Meaningful Data - Best Internet Conference 2015 (Lithuania)Simo Ahava
The document discusses tips and tricks for improving data quality in Google Analytics. It provides examples of tracking additional metrics like weather and page visibility. It emphasizes understanding data collection mechanisms and moving beyond aggregate metrics to combine, segment, and visualize data. Custom dimensions and tags can be used to inject semantic data for crawlers. Overall it stresses that high quality data requires understanding how the data is collected and earned, not acquired.
Slides from my talk at MeasureCamp VII (London) in September 2015. Some key findings about Data Layers and how they are integrated with tag management solutions and organisations.
Tricks and tweaks for Google Analytics and Google Tag ManagerSimo Ahava
Slides from my talk at Google Analytics User Conference in Amsterdam.
Some preaching about data collection and then a list of my favorite ways to make GTM and GA data more meaningful to your organization and your unique business goals.
Key Insights From Funnels - Enhanced Ecommerce For Google AnalyticsSimo Ahava
The slides from my talk at GPeC Summit, Romania, on 11 May 2015.
I introduce the Enhanced Ecommerce reports for Google Analytics, but before I do, I outline my ideology for using Enhanced Ecommerce. It's not just a flashy set of reports, it's an optimization tool and a hypothesis machine. I'm less interested in successful transactions and more in things like abandonment and lack of engagement. Enhanced Ecommerce lets us expand the somewhat broken concept of a session-based conversion rate, and granularly investigate its components and particles. This way we can analyze not only transactions, visits, and visitors, but the products themselves, too.
Content Engagement with Google Analytics (Emerce Conversion 2015)Simo Ahava
My slides from the Emerce Conversion 2015 conference. Here's a nice method of reconfiguring a data collection platform such as Google Analytics so it gives you best possible data for YOUR business alone.
Enhanced Ecommerce For Content (SMX München 2015)Simo Ahava
The slides from my second talk at SMX München (18 March 2015).
I've used Enhanced Ecommerce, implemented via Google Tag Manager, to analyze the content and user funnels on my website, and how people interact with different pieces of content.
In these slides, I explain the methodology and the reasoning for such an unconventional approach.
It's such a fun experiment, but it also leads to a lot of new insights for content optimization.
Be Critical: Going Beyond The Defaults With GA And GTM (SMX Munich 2015)Simo Ahava
Slides from my first talk at SMX München on March 17, 2015. The talk was about inspiring a critical approach to the metrics and dimensions we access through tools like Google Analytics. Sometimes we have to tweak the data collection mechanism to get more relevant results in our tools. In fact, I want to say that the quality of data in these platforms is directly proportional to your understanding of how the data is collected and aggregated.
So be critical! Make the most of the metrics and dimensions, and ensure that the data you're using to grow your business is relevant.
The document discusses tag management systems and how they operate in the stateless web environment. It notes that TMS inject JavaScript and act as message buses to update data models. While TMS were originally developed for non-technical marketers, they now serve both marketing and technical functions, including injecting tags and metadata, fixing code errors, and loading libraries. The document cautions against using TMS to fix underlying website issues and recommends proper integration with backend systems.
The document discusses Google Analytics and strategies for making metrics more meaningful. It proposes treating blog content like online products by tracking things like page views, scroll depth, and dwell time to measure user engagement. Specific strategies covered include using the Page Visibility API to determine meaningful page views and modeling content engagement metrics after ecommerce metrics like product impressions, add to cart, and purchase. The tips provided emphasize designing data collection with analysis in mind.
Tag Management Solutions - Best Data Ever (Marketing Festival 2014)Simo Ahava
Tag Management Solutions can really change things for your organization. Their biggest asset is the fact that they'll help you turn your processes around. In this talk I gave at Marketing Festival (CZ) 2014, I go over six of the most commonly asked questions around TMSs, and I explain the ways you can use the answers to improve the way your organization collects and uses data.
An Introduction to AI LLMs & SharePoint For Champions and Super Users Part 1BryanMurray35
This is part 1 of an 8-part introductory course for SharePoint Champions and Superusers focusing on integrating Large Language Models (LLMs) into corporate environments. Section 1 introduces LLMs, covering their definition, history, and capabilities. It explores how LLMs work, their impact across industries, and current limitations. The section also discusses popular LLM examples and future directions in the field, setting the foundation for understanding their potential in SharePoint contexts.
The course then takes a look at using online LLMs, local LLM deployment for corporate use, and the intricate process of installing and configuring these models. It provides detailed guidance on integrating LLMs with SharePoint, exploring various applications such as enhanced search, automated content tagging, and intelligent document processing. The later sections cover best practices and governance for LLM-enhanced SharePoint environments, addressing crucial aspects like data privacy, ethical considerations, and user adoption strategies.
The course concludes by examining future trends and considerations, preparing participants for the evolving landscape of AI-enhanced knowledge management. Throughout, it emphasizes practical applications, challenges, and solutions, equipping SharePoint Champions and Superusers with the knowledge to leverage LLMs effectively within their organizations.
Yes, most of it was written by an LLM.
EU Artificial Intelligence Act (High-level summary of the AI Act)prb404
Updated on 30 May in accordance with the Corrigendum version of the AI Act.
In this article we provide you with a high-level summary of the AI Act, selecting the parts which are most likely to be relevant to you regardless of who you are. We provide links to the original document where relevant so that you can always reference the Act text.
To explore the full text of the AI Act yourself, use our AI Act Explorer. Alternatively, if you want to know which parts of the text are most relevant to you, use our Compliance Checker.
View as PDF
Four-point summary
The AI Act classifies AI according to its risk:
Unacceptable risk is prohibited (e.g. social scoring systems and manipulative AI).
Most of the text addresses high-risk AI systems, which are regulated.
A smaller section handles limited risk AI systems, subject to lighter transparency obligations: developers and deployers must ensure that end-users are aware that they are interacting with AI (chatbots and deepfakes).
Minimal risk is unregulated (including the majority of AI applications currently available on the EU single market, such as AI enabled video games and spam filters – at least in 2021; this is changing with generative AI).
The majority of obligations fall on providers (developers) of high-risk AI systems.
Those that intend to place on the market or put into service high-risk AI systems in the EU, regardless of whether they are based in the EU or a third country.
And also third country providers where the high risk AI system’s output is used in the EU.
Users are natural or legal persons that deploy an AI system in a professional capacity, not affected end-users.
Users (deployers) of high-risk AI systems have some obligations, though less than providers (developers).
This applies to users located in the EU, and third country users where the AI system’s output is used in the EU.
General purpose AI (GPAI):
All GPAI model providers must provide technical documentation, instructions for use, comply with the Copyright Directive, and publish a summary about the content used for training.
Free and open licence GPAI model providers only need to comply with copyright and publish the training data summary, unless they present a systemic risk.
All providers of GPAI models that present a systemic risk – open or closed – must also conduct model evaluations, adversarial testing, track and report serious incidents and ensure cybersecurity protections.
Ethically Aligned Design (Overview - Version 2)prb404
This document has been created by committees of The IEEE Global Initiative on Ethics of
Autonomous and Intelligent Systems, (“The IEEE Global Initiative”) composed of several hundred
participants from six continents, who are thought leaders from academia, industry, civil society,
policy and government in the related technical and humanistic disciplines to identify and find
consensus on timely issues.
The document’s purpose is to:
• Advance a public discussion about how we can establish ethical and social implementations
for intelligent and autonomous systems and technologies, aligning them to defined values and
ethical principles that prioritize human well-being in a given cultural context.
• Inspire the creation of Standards (IEEE P7000™ series and beyond) and associated
certification programs.
• Facilitate the emergence of national and global policies that align with these principles.
By inviting comments for Version 2 of Ethically Aligned Design, The IEEE Global Initiative provides the
opportunity to bring together multiple voices from the related scientific and engineering communities
with the general public to identify and find broad consensus on pressing ethical and social issues and
candidate recommendations regarding development and implementations of these technologies.
Understanding Media Literacy and Managing Misinformation (2024 edition)Damian Radcliffe
Presentation delivered to Fulbright Scholars and Teaching Assistants focused on issues related to navigating misinformation and media literacy in Europe/Eurasia, with a special focus on media freedom, gatekeepers, as well as case studies and tips for managing misinformation.
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...Bert Blevins
In the ever-evolving landscape of cybersecurity, safeguarding sensitive data and critical systems has become paramount. As cyber threats grow in sophistication, organizations are constantly seeking innovative methods to fortify their defenses. Multi-Factor Authentication (MFA) stands out as a potent tool within the security arsenal, particularly when integrated with Privileged Access Management (PAM).
Privileged access management encompasses the methods, protocols, and tools employed to regulate and monitor access to privileged accounts within an organization. These accounts wield elevated privileges, enabling users to execute vital operations such as system configuration, access to sensitive data, and management of network infrastructure. However, if these privileges fall into the wrong hands, they pose a significant security risk. MFA adds an additional layer of protection by requiring users to provide multiple forms of verification before gaining access to a system or application. Key components of MFA in PAM include biometric verification, passwords, security tokens, and one-time passcodes. Deploying MFA within a PAM environment necessitates meticulous planning and consideration of various factors to ensure robust security.
Ensuring Secure and Efficient Automation: Power Automate Compliance Review an...Bert Blevins
Automation is essential for raising productivity and improving operational efficiency in today’s rapidly evolving business environment. Microsoft Power Automate stands out as a leading tool, enabling businesses to integrate various services and automate repetitive tasks. However, ensuring compliance and robust auditing practices is crucial to safeguard data security, privacy, and adherence to legal standards. This article delves into the essentials of conducting a Power Automate compliance review and audit, highlighting key considerations and best practices.
Power Automate, part of the Microsoft Power Platform, offers extensive automation capabilities across diverse services and applications. Compliance involves ensuring that all automated processes align with organizational policies, legal mandates, and industry regulations such as GDPR and HIPAA. Key compliance aspects include data security and privacy, regulatory adherence, and maintaining auditability and transparency.
To ensure data security, Power Automate flows must employ encryption, comply with data residency requirements, and implement strict access controls. Regulatory compliance requires adherence to laws like GDPR, which mandates data minimization and lawful processing, and HIPAA, which protects sensitive patient information. Additionally, maintaining detailed logs, comprehensive audit trails, and robust monitoring are critical for transparency and accountability.
Conducting a compliance review involves identifying applicable regulations, creating an inventory of workflows, assessing security controls, reviewing data handling practices, conducting risk assessments, and evaluating compliance documentation. This systematic approach ensures that automation processes are secure, compliant, and efficient, ultimately enhancing organizational resilience and operational excellence.
13. Graphic adapted from https://web.dev/samesite-cookies-explained/
https://page.somedomain.com/
https://page.otherdomain.com/
https://page.thirddomain.com/
https://image.cdn.com/image.gif
All pages include a request to the third-party resource, thus including
all cookies written on the third-party domain, enabling cross-site tracking.
51. Manage ad frequency
Build graphs and comprehensive audience profiles
Cookie matching/syncing
View-through attribution
Target ads
52. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
53. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
54. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
55. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
56. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
57. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
1st party data collection
58. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
1st party data collection
Tag management
59. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
1st party data collection
Tag management
Client-side state
60. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
1st party data collection
Tag management
Client-side state
Data quality
61. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
1st party data collection
Tag management
Client-side state
Data quality
62. Manage ad frequency
Build graphs and comprehensive audience profiles
Cross-site tracking
Cookie matching/syncing
View-through attribution
Target ads
Analytics integrations
SSO / login flows
State in embedded services
Multi-purpose scripts
1st party data collection
Tag management
Client-side state
Data quality
65. Block Restrict
Brave
3rd party context
Strips all cookies from 3P
requests.
Blocks all requests to
domains in filter lists.
Strips cross-site referrers
in navigational requests.
Spoofs cross-site referrers
in subresource HTTP requests.
Strips fbclid, gclid, msclkid, mc_eid
parameters from request URLs.
67. Block Restrict
Brave
3rd party context
Cookies, requests, referrers Referrers
Chrome - -
Blocks cookies in 3P
context if target domain
is classified (on-device
and/or globally), with
mitigations (widget inter-
actions, redirects, oAuth
flows).
Other cookies set to 1h
expiration if no interaction
with site in 1P context.
Strips potential user identifiers
from request URLs, unless in
global safe set.
Downgrades referrer to origin
in cross-origin requests.
Cliqz
69. Block Restrict
Brave
3rd party context
Cookies, requests, referrers Referrers
Chrome - -
Cliqz Cookies Cookies, request URLs
Edge
Blocks cookies in 3P
requests if target domain
in Trust Protection Lists,
with mitigations for
engagement and same-org.
Blocks all script-writable
storage with same
conditions as above.
Blocks requests to
Fingerprinting and
Cryptomining domains.
71. Block Restrict
Brave
3rd party context
Cookies, requests, referrers Referrers
Chrome - -
Cliqz Cookies Cookies, request URLs
Edge Cookies, storage, requests -
Firefox
Blocks cookies in 3P
requests if target domain
classified in Disconnect.me.
Blocks requests to
Cryptomining category.
Blocks requests if domain
in Fingerprinting and
Tracking category.
Blocks localStorage and
IndexedDB for classified
domains.
73. Block Restrict
Brave
3rd party context
Cookies, requests, referrers Referrers, request URLs
Chrome - -
Cliqz Cookies Cookies, request URLs
Edge Cookies, storage, requests -
Firefox Cookies, storage, requests -
Safari
Blocks cookies if no prior
cookies set.
Blocks cookies if no
interaction with site in 1P.
Blocks cookies if
classified by ITP (except
with Storage Access API).
Blocks IndexedDB.
Partitioned and ephemeral
localStorage.
Downgrade referrer to origin
on subresource HTTP requests.
Downgrade referrer to eTLD+1
if referring page classified with
URL decoration.
78. Block Restrict
Brave
1st party context
Cookies, requests, referrers Referrers
Chrome - -
Non-HttpOnly cookies expire
in 7 days.
HttpOnly cookies expire in 30
days.
Cookies set on classified
domains that are visited
infrequently expire in 7 days.
Cookies set on classified
domains that are visited
frequently expire in 30 days.
Cliqz
80. Block Restrict
Brave
1st party context
Cookies, requests, referrers Referrers, request URLs
Chrome - -
Cliqz Cookies Cookies, request URLs
Edge Cookies, storage, requests -
Firefox Cookies, storage, requests -
Safari
Cookies set with JavaScript
expire in 7 days.
Cookies set with JavaScript
when referring domain is
classified and URL has link
decoration expire in 24 hours.
Other browser storage is
expired in 7 days since last
interaction if referring domain
is classified and URL has
link decoration.
81. Block Restrict
Brave
1st party context
- Cookies
Chrome - -
Cliqz - Cookies
Edge - -
Firefox - -
Safari - Cookies, storage
90. DO
-Periodically audit the use of client-side state in your sites, services, and applications. Avoid
over-reliance; use HttpOnly where possible, then HTTP headers, then JS.
-Figure out how to incentivize logging in.
-Set cookies you need in third-party context to SameSite=None;Secure, with fallbacks
for unsupported browsers.
- Utilize Storage Access API for access to third-party storage.
-Consider the browser as a manifestation of the user’s desire and intent with regard to
tracking. Err on the side of as much privacy as possible.
-No evil.
91. DO NOT
-Look at "server-side analytics" as a silver bullet.
-Ignore small market share web browsers.
-Expect tracking prevention development to settle / slow down.
-Spread FUD about the impact of these measures without empirical data to back it up with.
-Expect that browsers will handle the ethical / legal side of data collection for you.
-Think that browsers have got tracking prevention "right"