Chapter 10. Privacy-Protecting Technologies

In this chapter, we’ll look at a few classes of programs that you can use to safeguard your privacy while using the Web. Collectively, these technologies are frequently referred to as privacy-protecting technologies.

For each major section in this chapter, we have attempted to introduce the broad program category (blocking ads, crushing cookies, anonymous browsing, and secure email), give a few examples of programs in the category, and then finally show one or two of these programs in action. Because the Internet is a fast-changing place, it’s quite possible that some or all of the programs discussed here will no longer be available by the time this book appears in print. It’s also possible that new programs will be introduced that are not mentioned here. That’s why you should use this chapter as a survey of the kinds of tools that are available for enhancing web privacy, rather than as an actual buyer’s guide.

If you are interested in protecting your privacy from web advertisers—or if you simply want to see fewer advertisements when you browse the Internet—then you will find yourself in something of a quandary. That’s because the companies that are developing web browsers—Microsoft, Netscape, and Opera Software—have all developed business units that make money by showing advertisements to consumers.[115] Browsers have become programs for delivering ads (see Figure 10-1).

A web that is filled with advertisements doesn’t pose a problem for many consumers. After all, advertisements are everywhere: they are on our highways, in our newspapers and magazines, on television, and even on so-called “public radio” stations. Why should the Internet be any different?

But as we saw in the previous chapter, the Web is different from other advertising venues. For starters, it’s simply not possible for a company buying a billboard along a busy highway to get a list of the names, addresses, and phone numbers of all the people who glance up to read their advertisement. A company that sells magazine advertisement space can’t correlate the advertisements in five different publications that you’ve responded to, and then sell your name as a “premium customer.” Yet these kinds of invasive practices are possible on the Internet. Fortunately, the design of the Internet also makes it possible to mount a significant defense against the primary privacy-invading tools of advertisers—their cookies—as well as against the advertisements themselves.

To allow browsing from behind a corporate firewall, web browsers often use services called proxy servers . A proxy server is a program that receives a request from a web browser and forwards the request to the remote web server. The proxy then waits for the response from the remote server and, when it is received, sends the request back to the original browser client that made the request. Most proxy servers are located on corporate firewalls. They allow organizations to carefully control the information that passes between the corporate LAN and the rest of the Internet.

A local HTTP proxy is a program designed to proxy HTTP (web) traffic. It runs on your local computer (see Figure 10-2). The local HTTP proxy’s position between your computer and the rest of the Web gives the proxy the opportunity to monitor what you are doing, preview the pages, and, optionally, modify the content that you see.

A local HTTP proxy can do many things, including:

Many of these functions sound quite nefarious and they can be—if somebody else is running the HTTP proxy. But if you have control of the HTTP proxy, then the proxy gives you the ability to control your web browser in ways that were not envisioned (or are simply not allowed) by the browser’s creator.

One of the most obvious things to do with a local HTTP proxy is to prevent web advertisements. There are two ways a local proxy can block advertisements. Assuming the proxy can identify an advertisement (a tricky task), the proxy could block the URLs associated with the ads or could edit out the HTML that causes the advertisement to be displayed. These techniques are demonstrated in Figures Figure 10-3, Figure 10-4, and Figure 10-5.

There are many reasons you might want to block an advertisement on a web site:

Of course, there are disadvantages as well to blocking advertisements:

Many programs that block advertisements also crush cookies ; that is, they can selectively allow or deny the transfer of cookies between remote sites and your computer.

One of the big advantages of selective cookie blocking is that you can block cookies from some companies, such as Internet advertising firms, while still allowing cookies from companies that you do business with, such as banks and online brokerage firms.

Ad blockers can perform many other useful functions beyond blocking advertisements and crushing cookies, including:

It is simply astonishing how effective ad blockers can be—and how many advertisements are present on today’s Web. Spend a few minutes browsing on the Web with an ad blocker, and you might discover that upwards of 50 advertisements have been blocked after viewing only a handful of pages.

Many companies have incorporated ad blocker technology into their products. Some of the products are free; others have a small charge. Most of the programs run only on Windows. In some cases, a Windows-based proxy can provide an ad blocking service to other computers on your local area network. Table 10-1 provides a summary of some ad-blocking programs currently available.



[115] Mozilla, the open source browser based on Netscape’s code, has no such profit motive, and contains per-site image filtering that can be used to block advertisements.