
Privacy on the Web
Addons and software that protect your privacy
An efficient blocker add-on for various browsers. Fast, potent, and lean.
uBlock Origin is NOT an "ad blocker": it is a wide-spectrum blocker -- which happens to be able to function as a mere "ad blocker". The default behavior of uBlock Origin when newly installed is to block ads, trackers and malware sites -- through EasyList, EasyPrivacy, Peter Lowe’s ad/tracking/malware servers, Online Malicious URL Blocklist, and uBlock Origin's own filter lists.
Ghostery sees the invisible web - tags, web bugs, pixels and beacons. Ghostery tracks the trackers and gives you a roll-call of the ad networks, behavioral data providers, web publishers, and other companies interested in your activity. After showing you who's tracking you, Ghostery also gives you a chance to learn more about each company it identifies. How they describe themselves, a link to their privacy policies, and a sampling of pages where we've found them are just a click away. Ghostery allows you to block scripts from companies that you don't trust, delete local shared objects, and even block images and iframes. Ghostery puts your web privacy back in your hands. Ghostery has different builds for the different browsers.
Control your cookies! This extension is inspired by Self-Destructing Cookies. When a tab closes, any cookies not being used are automatically deleted. Prevent tracking by other cookies and add only the ones you trust. Easily import and export your cookie whitelist.
Main features • Auto deletes cookies from closed tabs • Whitelist support for sites you want to keep cookies • Export or import your white list of cookies expressions/rules • Internationalization (i18n) • Available for both Chromium/Chrome and Firefox/Tor Browser • Open source. MIT License.
Neat URL cleans URLs, removing parameters such as Google Analytics' utm parameters.
Custom rules can be added using the global format or the domain specific format (parameter@domain). A domain specific parameter would be, for example, utm_campaign@phoronix.com.
Parameter rules
A parameter is something that starts with ?. You can add your own parameter in the options of Neat URL. The ? is ommitted in the options, so a ?ved parameter becomes "ved". There are a few exceptions to this rule (see below)
Parameters can be global (for every domain): utm_source
Parameters can contain @ signs (domain-specific): nb@tweakers.net
Parameters can contain @ signs with a wildcard so every subdomain will match too: param@*.wired.com
Parameters can contain @ signs with a wildcard at the end of a domain name (matches every domain name which begins with "google" and ends in an unknown suffix: param@google.*
Parameters can also apply globally (first rule), except for a (wilcard) domain (second rule):
ref !ref@amazon.co.uk
The excluded domain always takes precedence. Should you include "ref" and "!ref", "!ref" will apply.
Other valid parameters (exceptions to the ? rule): #xtor=RSS-8 (remove this parameter - be sure to include its value as well when you are using anchor tags) #xtor=RSS-8@futura-sciences.com $/ref@amazon.* (remove everything after /ref on amazon domains - this will only apply when there are no query parameters left after removing the filtered query parameters) $$/ref@amazon.* (remove everything after /ref on amazon domains - this will always apply, even when there are other query parameters after removing the filtered query parameters - this option is available because the user should be in control but beware that double dollar signs are dangerous, it might break the URL)
Invalid parameters: param@.google. (too many wildcards) !ved (this is some random string - not supported, but it might work) /ref@amazon.*$ (dollar sign should be at the beginning)
Disconnect was founded in 2011 by former Google engineers and a consumer- and privacy-rights attorney. We develop award-winning, user-friendly privacy and security software in San Francisco, California. Disconnect exists to help solve an important social issue and our founding principles are reflected in the way we run the company. We’re proud to be a Certified B Corp and honored to be named one of the best places to work in the B corp community. You can learn more about our team here and feel free to send us a note if you think you’d be a good fit to join our growing company.
HTTPS Everywhere is a browser extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.
Many sites on the web offer some limited support for encryption over HTTPS, but make it difficult to use. For instance, they may default to unencrypted HTTP, or fill encrypted pages with links that go back to the unencrypted site.
The HTTPS Everywhere extension fixes these problems by rewriting all requests to these sites to HTTPS.
HTTPS Everywhere can protect you only when you're using sites that support HTTPS and for which HTTPS Everywhere includes rules.
Websites have increasingly begun to rely much more on large third-parties for content delivery. Canceling requests for ads or trackers is usually without issue, however blocking actual content, not unexpectedly, breaks pages. The aim of this add-on is to cut-out the middleman by providing lightning speed delivery of local (bundled) files to improve online privacy.
• Protects privacy by evading large delivery networks that claim to offer free services. • Complements regular blockers such as uBlock Origin (recommended), Adblock Plus, et al. • Works directly out of the box; absolutely no prior configuration required.
Decentraleyes is no silver bullet, but it does prevent a lot of websites from making you send these kinds of requests. Ultimately, you can make Decentraleyes block requests for missing CDN resources, too.
Simpler introduction: https://git.synz.io/Synzvato/decentraleyes/wikis/Simple-Introduction
Am I Protected?
The following testing utility shows you if you are properly protected. It's the recommended and, probably, fastest way to see if this add-on is installed, enabled, and correctly configured.
Full link to testing utility: https://decentraleyes.org/test
Frequently Asked Questions
Full link to FAQ: https://git.synz.io/Synzvato/decentraleyes/wikis/Frequently-Asked-Questions
Technical Information
-
Supported Networks: Google Hosted Libraries, Microsoft Ajax CDN, CDNJS (Cloudflare), jQuery CDN (MaxCDN), jsDelivr (MaxCDN), Yandex CDN, Baidu CDN, Sina Public Resources, and UpYun Libraries.
-
Bundled Resources: AngularJS, Backbone.js, Dojo, Ember.js, Ext Core, jQuery, jQuery UI, Modernizr, MooTools, Prototype, Scriptaculous, SWFObject, Underscore.js, and Web Font Loader.
-
Decentraleyes is not maintain switch to LocalCDN !
Also Ghostery is shady I read somewhere it was a spyware.
hmm thanks for the tips. I made this list a long time ago. maybe i should revisit it
Reply written