How to tell if websites honor “Do Not Track” requests?

ehtan

I know that Yahoo just announced that it will ignore the Do Not Track (“DNT”) requests of visitors to its sites, but how can you tell if other websites are ignoring it?

Topic: Security
Answer this Question

Answers

3 total
ttopp
Vote Up (7)

The Electronic Freedom Foundation (or EFF) has a browser plug-in called Privacy Badger that will do what you want. There was an article about it on Friday on ITworld, and here is the LINK to the browser plug-in

 

jimlynch
Vote Up (5)

WHY DO NOT TRACK MAY NOT PROTECT ANYBODY’S PRIVACY
http://www.digitaltrends.com/mobile/why-do-not-track-may-not-protect-any...

"Microsoft ruffled feathers in the online privacy community this week by announcing that Internet Explorer 10 would enable Do Not Track technology by default. Many have lauded the move as an instance of Microsoft putting consumers’ interests above those of behavioral advertisers — which, ironically, includes itself. However, Microsoft’s stance may run afoul of the W3C committee that’s actually drafting the Do Not Track standard. Right now, they’re saying browser makers must only send a Do Not Track signal with a user’s explicit consent.

What is Do Not Track and how can it protect your privacy? And is Microsoft’s stance about protecting consumers…or whittling away at Google’s dominant position in the online advertising world?"

Number6
Vote Up (5)

I’d like to add one thing about Privacy Badger. It doesn’t just tell you who is ignoring your requests to DNT, if it determines someone is, it will prevent your browser from loading that ad content. And, since the additional add content stops being loaded, the folks ignoring your DNT request don’t get to track you anyway. Thanks, EFF, and take that Yahoo!

Ask a question

Join Now or Sign In to ask a question.
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
The number of government requests worldwide seeking Twitter users' data, or the removal of content, increased during the first half of 2014.
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows.
Anonymity network hacked with sophisticated traffic correlation technique.
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness