当前位置:网站首页>An example of the mandatory measures of Microsoft edge browser tracking prevention
An example of the mandatory measures of Microsoft edge browser tracking prevention
2022-07-28 11:42:00 【Wang Zixi】
Microsoft Edge The first component of the trace prevention function in is classification . In order to classify online trackers and group them ,Microsoft Edge Use the disconnected open source tracking protection list , That is to say Disconnect open source tracking protection lists.
These lists are available through “ Trust protection list ” Component supply , This component can be used in edge://components View in .

After downloading , The list is stored on disk , Developers can use them to identify specific URL Whether or how to classify .
In order to determine a URL Whether it is Microsoft Edge The classification system in is regarded as a tracker , The system will check a series of host names , Start with exact match , Then continue to check the partial match of up to four tags outside the top-level domain .
Example : If we have the following url:
https://a.subdomain.of.a.known.tracker.test/some/path
The following hotname Will be test :
- a.subdomain.of.a.known.tracker.test
- of.a.known.tracker.test
- a.known.tracker.test
- known.tracker.test
- tracker.test
If any of these hostname matches the hostname in the disconnect list ,Microsoft Edge Enforcement measures will continue to be evaluated to prevent users from being tracked .
To prevent tracking operations on the network ,Microsoft Edge Two mandatory measures have been taken for the classification tracker :
Restrict storage access - If a known tracking resource attempts to access any that may try to retain user data Web Storage ,Microsoft Edge Will block this access . This includes restricting the tracker from getting or setting cookie And visit IndexedDB and localStorage Isostorage API The ability of .
Prevent resources from loading - If the website is loading known tracking resources ,Microsoft Edge The load may be blocked before the request reaches the network , It depends on the compatibility effect of the load and the tracking blocking setting set by the user . Blocked loading may include tracking scripts 、 Pixels 、iframe etc. . This prevents any data that might be sent to the tracking domain , It may even improve loading time and page performance as a side effect .
The most typical behavior , It is initiated by the application HTTP request , By Edge prevent , Return error message :
net::ERR_BLOCKED_BY_CLIENT, As shown in the figure below :

边栏推荐
- Detailed explanations of%*d,%.*s, etc. of [C language]: "recommended collection"
- Cvpr2021 pedestrian re identification /person re identification paper + summary of open source code
- R language uses LM function to build regression model, uses the augmented function of bloom package to store the model results in dataframe, and uses ggplot2 to visualize the regression residual diagr
- 【Gradle】This version of the JMH Gradle plugin requires Gradle 6+, you are using 6.6.
- 什么样的知识付费系统功能,更有利于平台与讲师发展?
- Blackboard cleaning effect shows H5 source code + very romantic / BGM attached
- Design a system that supports millions of users
- Server online speed measurement system source code
- Database advanced learning notes -- object type
- Digital twin rail transit: "intelligent" monitoring to clear the pain points of urban operation
猜你喜欢

万字详解 Google Play 上架应用标准包格式 AAB

Random talk on GIS data (V) - geographic coordinate system

Five Ali technical experts have been offered. How many interview questions can you answer

What kind of knowledge payment system functions are more conducive to the development of the platform and lecturers?

PFP会是数字藏品的未来吗?

移动端人脸风格化技术的应用

Quickly deploy mqtt clusters on AWS using terraform

Refresh your understanding of redis cluster

Embrace open source guidelines

Game theory 1. Introduction (basic concepts of combination games, confrontation search, bash games, Nim games)
随机推荐
R language uses LM function to build regression model with interactive items, and uses: sign (colon) to represent the interaction of variables (colon is pure multiplication, excluding the constituent
Quickly deploy mqtt clusters on AWS using terraform
echo -ne(echo line)
R language ggplot2 visualization: use the ggboxplot function of ggpubr package to visualize the box diagram and customize the fill parameter to configure the filling color of the box
Function of interface test
Game theory 1. Introduction (basic concepts of combination games, confrontation search, bash games, Nim games)
In order to ensure the normal operation of fire-fighting equipment in large buildings, the power supply monitoring system of fire-fighting equipment plays a key role
Database advanced learning notes - storage structure
Detailed explanations of%*d,%.*s, etc. of [C language]: "recommended collection"
Are interviews all about memorizing answers?
Embrace open source guidelines
MySQL (version 8.0.16) command and description
Leecode8 string conversion integer (ATOI)
How to use JWT for authentication and authorization
大佬们,问下,这个不能checkpoint,因为有个jdbc的task任务状态是FINISHED,
Iterative method for determinant (linear algebraic formula)
Advanced database technology learning notes 1 -- Oracle deployment and pl/sql overview
PFP会是数字藏品的未来吗?
Who's the big God help? Let's see how Oracle number type parsing works. Struct{scale=15, Val
[极客大挑战 2019]BabySQL-1|SQL注入