Verizon users might want to start looking for another provider. In an effort to better serve advertisers, Verizon Wireless has been silently modifying its users' web traffic on its network to inject a cookie-like tracker. This tracker, included in an HTTP header called X-UIDH, is sent to every unencrypted website a Verizon customer visits from a mobile device. It allows third-party advertisers and websites to assemble a deep, permanent profile of visitors' web browsing habits without their consent.Verizon apparently created this mechanism to expand their advertising programs, but it has privacy implications far beyond those programs. Indeed, while we're concerned about Verizon's own use of the header, we're even more worried about what it allows others to find out about Verizon users. The X-UIDH header effectively reinvents the cookie, but does so in a way that is shockingly insecure and dangerous to your privacy. Worse still, Verizon doesn't let users turn off this "feature." In fact, it functions even if you use a private browsing mode or clear your cookies. You can test whether the header is injected in your traffic by visiting lessonslearned.org/sniff or amibeingtracked.com over a cell data connection.How X-UIDH Works, and Why It's a Problem
1More
Top Torrent Trackers Now Handle Up to 56 Million Peers - Each | TorrentFreak - 0 views
2More
Pirates Switch From Torrents to Streaming and Download Sites - TorrentFreak - 1 views
4More
Verizon Injecting Perma-Cookies to Track Mobile Customers, Bypassing Privacy Controls |... - 0 views
1More
5 Time Tracking Addons For Firefox - 0 views
1More
Lightbeam para Firefox, la evolución de Collusion - MuySeguridad - 0 views
Midori / FAQ - 0 views
Torrent Server for the Fedora Project - 0 views
1 - 17 of 17
Showing 20▼ items per page