back to article The Register Guide on how to stay anonymous (part 2)

In part one of this series, I explored the privacy threats presented by targeted advertising, and asked why we should care. Browser referral, social media buttons and cookies were examined as examples of basic methods used to track our movements across the internet. I also explored why advertisers track us, and examined …

COMMENTS

This topic is closed for new posts.

Page:

  1. Drew V.
    Pint

    Well done Mr. Pott

    Until now I was unaware of things like HTML5 tracking and tools such as BleachBit, and it's always interesting to read more about the workings of LSOs. Kudos.

  2. Anonymous Coward
    Anonymous Coward

    Privilege Escalation Bug?

    Is the link to the Flash privilege escalation bug incorrect? MS-ISAC ADVISORY NUMBER:

    2011-015 is for a bug that allows remote code execution and "could also result in an attacker gaining the same privileges as the logged on user". The bug itself seems to relate to flash embedded in an Excel attachment received via e-mail which hardly fits the "browsing the web" scenario being discussed.

Page:

This topic is closed for new posts.

Other stories you might like