NoTrace icon
NoTrace icon

NoTrace

NoTrace limits the diffusion of personally identifiable information and protect users's privacy against Web tracking and other dangerous privacy threats

NoTrace screenshot 1
NoTrace screenshot 2
NoTrace screenshot 3

Cost / License

  • Free
  • Open Source

Application type

Alerts

  • Discontinued

Platforms

  • Mac
  • Windows
  • Linux
  • Windows Mobile
  • iPhone
  • iPad
  • Firefox
Discontinued

No longer available through Firefox extension site. Last version from official site seems to be from 2014. See https://www.isislab.it/projects/NoTrace/

-
No reviews
3likes
0comments
0news articles

Features

Suggest and vote on features
  1.  Browser extension

 Tags

NoTrace News & Activities

Highlights All activities

Recent activities

No activities found.

NoTrace information

  • Developed by

    ISISLab
  • Licensing

    Open Source and Free product.
  • Alternatives

    13 alternatives listed
  • Supported Languages

    • English
NoTrace was added to AlternativeTo by Vikash on and this page was last updated .
No comments or reviews, maybe you want to be first?
Post comment/review

Featured in Lists

A list with 20 apps by Reptevye without a description.

List by Robert with 20 apps, updated

What is NoTrace?

NoTrace limits the diffusion of personally identifiable information and protect users's privacy against Web tracking and other dangerous privacy threats

NoTrace implements a supportive, comprehensive and improved approach for privacy protection to allow users to be aware of the risks of their navigation and to give them full control on effective actions to address online privacy threats. NoTrace exhibits the following features:

  1. Supportive privacy protection: it provides support for (novice and expert) users, awareness about privacy loss and personalized recommendations to limit it.
  2. Comprehensiveness: it addresses several malicious activities by providing, all in one, opportune countermeasures, whereas each of them is singularly provided by other popular extensions in this field. It also provides techniques to discover harmful activities through content-based filtering mechanisms and to limit the diffusion of personal identifiable information.
  3. Effectiveness: Detection of malicious objects and awareness about their privacy infringements. The tool is based on a detailed analysis and implementation of different privacy protection techniques to limit the diffusion of various bits of information to third party sites.