The PRIVATE WiFi Blog

Search By Topic:

Popular Topics:



PRIVATE WiFi

The PRIVATE WiFi Blog

News & Features | Feb 15th, 2011

Surf Anonymously? A Visual Map of How Marketers Track Your Online Habits

Elaine Rigoli

Check out a fantastic, highly visual chart (via the link below) that details in several steps how advertisers are able to track consumers, from first-party tracker files to cookies and beyond, as well as what a “Privacy Bill of Rights” would look like. As this blog on Site Jabber explains, “the idea of a national ‘Privacy Bill of Rights’ arrived two weeks after the Federal Trade Commission recommended the creation of a ‘Do Not Track’ tool to let consumers stop or restrict advertisers from studying their online activity for ad targeting purposes — including the websites they visit, the links they check, their Internet searches, and their online purchases.”

Associated Topics:

Associated Topics:

Comments

Related Posts

How To: BlueKai, Online Tracking, and Your Privacy

how-to
Jared Howe | May 5th, 2015

BlueKai is an online marketing firm that provides data to marketers, ad networks and publishers. This data is used to target ads to consumers.

This information that BlueKai gathers is considered "anonymous" because it identifies web browsers, not individuals. However, Read More

How To: Safari Privacy and Security Settings

how-to
Jared Howe | May 5th, 2015

To edit the security settings for Safari:

  1. Go to Safari > Preferences.
  2. Click the AutoFill tab.
  3. On this tab, select what types of forms your browser fills in automatically.
    Note: In general, you should remove all the checkboxes

Read More

How To: Internet Explorer Privacy and Security Settings

how-to
Jared Howe | May 5th, 2015

Internet Explorer has security measures in place to help protect you as you browse the web.

Follow these steps to adjust these settings:

  1. Within Internet Explorer, go to Tools > Internet Options. The Internet Options window appears.
  2. Select the

Read More

How To: Managing Your iPhone Security

how-to
Jared Howe | May 5th, 2015

Smartphones, like the iPhone, have become increasingly important to our modern lives, and accessing account and professional content is shifting more towards mobile devices. The iPhone has security options that you can use, which are listed below.

Use a Passcode Read More

X

Thank you for subscribing to our newsletters

Your email has been added to our system. You will be e-mailed shortly with a request to confirm your membership. Please make sure to click the link in that message to confirm your subscription.