当前位置:网站首页>An example of the mandatory measures of Microsoft edge browser tracking prevention
An example of the mandatory measures of Microsoft edge browser tracking prevention
2022-07-28 11:42:00 【Wang Zixi】
Microsoft Edge The first component of the trace prevention function in is classification . In order to classify online trackers and group them ,Microsoft Edge Use the disconnected open source tracking protection list , That is to say Disconnect open source tracking protection lists.
These lists are available through “ Trust protection list ” Component supply , This component can be used in edge://components View in .

After downloading , The list is stored on disk , Developers can use them to identify specific URL Whether or how to classify .
In order to determine a URL Whether it is Microsoft Edge The classification system in is regarded as a tracker , The system will check a series of host names , Start with exact match , Then continue to check the partial match of up to four tags outside the top-level domain .
Example : If we have the following url:
https://a.subdomain.of.a.known.tracker.test/some/path
The following hotname Will be test :
- a.subdomain.of.a.known.tracker.test
- of.a.known.tracker.test
- a.known.tracker.test
- known.tracker.test
- tracker.test
If any of these hostname matches the hostname in the disconnect list ,Microsoft Edge Enforcement measures will continue to be evaluated to prevent users from being tracked .
To prevent tracking operations on the network ,Microsoft Edge Two mandatory measures have been taken for the classification tracker :
Restrict storage access - If a known tracking resource attempts to access any that may try to retain user data Web Storage ,Microsoft Edge Will block this access . This includes restricting the tracker from getting or setting cookie And visit IndexedDB and localStorage Isostorage API The ability of .
Prevent resources from loading - If the website is loading known tracking resources ,Microsoft Edge The load may be blocked before the request reaches the network , It depends on the compatibility effect of the load and the tracking blocking setting set by the user . Blocked loading may include tracking scripts 、 Pixels 、iframe etc. . This prevents any data that might be sent to the tracking domain , It may even improve loading time and page performance as a side effect .
The most typical behavior , It is initiated by the application HTTP request , By Edge prevent , Return error message :
net::ERR_BLOCKED_BY_CLIENT, As shown in the figure below :

边栏推荐
- Object to object mapping -automapper
- Quickly deploy mqtt clusters on AWS using terraform
- Encryption defect of icloud Keychain in Apple mobile phone
- PFP会是数字藏品的未来吗?
- R language ggplot2 visualization: use the ggdotplot function of ggpubr package to visualize the grouped dot plot, set the palette parameter, and set the color of data points in different grouped dot p
- Database advanced learning notes - system package
- Object stream of i/o operation (serialization and deserialization)
- 使用 Terraform 在 AWS 上快速部署 MQTT 集群
- 拥抱开源指南
- vim命令下显示行号[通俗易懂]
猜你喜欢

Design a system that supports millions of users

Shell (I)
![[applet] how to notify users of wechat applet version update?](/img/04/848a3d2932e0dc73adb6683c4dca7a.png)
[applet] how to notify users of wechat applet version update?

mysql还有哪些自带的函数呢?别到处找了,看这个就够了。

使用 Terraform 在 AWS 上快速部署 MQTT 集群
![[geek challenge 2019] babysql-1 | SQL injection](/img/21/b5b4727178a585e610d743e92248f7.png)
[geek challenge 2019] babysql-1 | SQL injection

CVPR2021 行人重识别/Person Re-identification 论文+开源代码汇总

Zotero document manager and its use posture (updated from time to time)

Localization, low latency, green and low carbon: Alibaba cloud officially launched Fuzhou data center

PFP会是数字藏品的未来吗?
随机推荐
R language uses LM function to build regression model with interactive items, and uses: sign (colon) to represent the interaction of variables (colon is pure multiplication, excluding the constituent
Three methods of using unity mouse to drive objects
How to use JWT for authentication and authorization
Guys, ask me, this can't be checkpoint, because there is a JDBC task whose task status is finished,
R language uses LM function to build regression model and regression model for transformed data (for example, it is necessary to build regression model for X and y, but they have no linear relationshi
可视化大型时间序列的技巧。
[applet] how to notify users of wechat applet version update?
Localization, low latency, green and low carbon: Alibaba cloud officially launched Fuzhou data center
Sirius network verification source code / official genuine / included building tutorial
[FPGA tutorial case 41] image case 1 - reading pictures through Verilog
b2子主题/博客b2child子主题/开源源码
Jupiter、spyder、Anaconda Prompt 、navigator 快捷键消失的解决办法
Design a system that supports millions of users
Rongyun IM & RTC capabilities on new sites
Shell (I)
[MySQL] MySQL error "error 2006 (HY000): MySQL server has gone away"
R language - some metrics for unbalanced data sets
R language ggplot2 visualization: use the ggboxplot function of ggpubr package to visualize the box diagram and customize the fill parameter to configure the filling color of the box
I/O实操之对象流(序列化与反序列化)
Cvpr2021 pedestrian re identification /person re identification paper + summary of open source code