Wirtschaftsuniversität Wien Magisterarbeit - SemanticLab
Wirtschaftsuniversität Wien Magisterarbeit - SemanticLab Wirtschaftsuniversität Wien Magisterarbeit - SemanticLab
shortcuts and context-menu, users should take some time to initially configure NoScript as most websites depend on JavaScript and/or Java to work properly. However, in the authors’ view NoScript is only suited for advanced users as unexperienced users may not have the knowledge to configure the tool correctly and hence may be frustrated that their favourite websites do not work anymore. 5.2.3. Flashblock As the name suggests, Flashblock prohibits the display of flash-content unless the website is listed in the white-list. It activates the flash-content by clicking on it as shown in Figure 5.6. Figure 5.6.: Flashblock in action: Press the “Flash”-button to start the flash animation 5.2.4. BugMeNot With BugMeNot users can bypass compulsory web registration by using the content menu of Firefox and logging in with the data provided via www.bugmenot.com. This helps users not to provide any sensitive information to third parties by using already existing logins as demonstrated for www.nytimes.com as shown in Figure 5.7. Users can rate the success rate of logins on www.bugmenot.com and submit new logins. 48
Figure 5.7.: Logging in onto www.nytimes.com by using BugMeNot 5.2.5. TrackMeNot TrackMeNot tries to protect users against profiling of search engines by randomly fire off queries to search engines in the background while surfing the Internet. The tool not just generates a lot of traffic in the background, it can also be questioned if it actually works as search engines probably have ways to differ automatically from manually submitted queries. If users want to make sure that their search queries are totally anonymized, they should use an extension such as Private Web Search or a proxy as described next. 5.2.6. Private Web Search (PWS) Private Web Search (PWS) is a Firefox extension that acts as a proxy to anonymize users’ search queries. Technically seen it acts as an HTTP proxy which filters the HTTP request. It then sends the search query to the search engine via the Tor anonymity network. The HTTP Proxy receives the answer from the Tor network and then returns the results back to PWS. The result is a normal answer to a search query but no sensitive (e.g. personal identifiable) information should have been transfered to the search engine. [Sai07] describes PWS and the technical background in more detail. Unfortunately the extension could not be evaluated due to difficulties to install and setup PWS. 49
- Page 8 and 9: Listings viii 3.1. HTTP response he
- Page 10 and 11: List of Tables x 3.1. PURPOSE sub-e
- Page 12 and 13: 1. Introduction This thesis address
- Page 14 and 15: In addition, the applied part of th
- Page 16 and 17: 2. Privacy Threats Privacy is the
- Page 18 and 19: term friendly fraud relates to legi
- Page 20 and 21: over iGoogle, search Wikipedia via
- Page 22 and 23: collect a lot of personal data abou
- Page 24 and 25: 2.4. Privacy sensitive technologies
- Page 26 and 27: • Data necessary to identify the
- Page 28 and 29: 3. Privacy Standards The following
- Page 30 and 31: The well-known location method (whi
- Page 32 and 33: • User Preferences: User-agents m
- Page 34 and 35: Another important issue for policy
- Page 36 and 37: 1 M i c r o s o f t Way< /DATA> Red
- Page 38 and 39: 28 PURPOSE Plain Language Translati
- Page 40 and 41: Finally, an example should be provi
- Page 42 and 43: • There is a commercial P3P polic
- Page 44 and 45: Element Value ruling allow user cat
- Page 46 and 47: 3.3.1. XACML - an introduction Simi
- Page 48 and 49: 3.3.3. Summary The introduced priva
- Page 50 and 51: specified conditions” [ISO01a]. T
- Page 52 and 53: applied to this characteristic too,
- Page 54 and 55: Figure 5.1.: Microsoft Internet Exp
- Page 56 and 57: 5.1.2. Firefox The Mozilla Foundati
- Page 60 and 61: 5.3. Proxies In this section, proxi
- Page 62 and 63: 52 Figure 5.10.: The settings dialo
- Page 64 and 65: 6. Development of a Privacy Plug-In
- Page 66 and 67: • components directory: this dire
- Page 68 and 69: Speaking of information it has to b
- Page 70 and 71: Figure 6.2.: Displaying the P3P pol
- Page 72 and 73: matches the users preferences befor
- Page 74 and 75: Figure 6.4.: The privacy policy of
- Page 76 and 77: is different from the one available
- Page 78 and 79: access elements in a policy which i
- Page 80 and 81: implementation available although t
- Page 82 and 83: [Dro06] Dennis Drotar, Rachel Green
- Page 84 and 85: [Kob07] Alfred Kobsa. Privacy-enhan
- Page 86 and 87: [Oli04] Nadia Olivero and Peter Lun
- Page 88 and 89: [Woo06] Jisuk Woo. The right not to
- Page 90 and 91: M i c r o s o f t i s a premier spo
- Page 92 and 93: 82
- Page 94 and 95: B. E-Mail correspondence Subject :
- Page 96: the Thank you , Renukesh M i c r o
shortcuts and context-menu, users should take some time to initially configure NoScript<br />
as most websites depend on JavaScript and/or Java to work properly. However, in the<br />
authors’ view NoScript is only suited for advanced users as unexperienced users may<br />
not have the knowledge to configure the tool correctly and hence may be frustrated that<br />
their favourite websites do not work anymore.<br />
5.2.3. Flashblock<br />
As the name suggests, Flashblock prohibits the display of flash-content unless the website<br />
is listed in the white-list. It activates the flash-content by clicking on it as shown in<br />
Figure 5.6.<br />
Figure 5.6.: Flashblock in action: Press the “Flash”-button to start the flash animation<br />
5.2.4. BugMeNot<br />
With BugMeNot users can bypass compulsory web registration by using the content<br />
menu of Firefox and logging in with the data provided via www.bugmenot.com. This<br />
helps users not to provide any sensitive information to third parties by using already<br />
existing logins as demonstrated for www.nytimes.com as shown in Figure 5.7. Users can<br />
rate the success rate of logins on www.bugmenot.com and submit new logins.<br />
48