Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
What's the story with these ads on Slashdot? Check out our new blog post to find out. ×
Privacy

Submission + - Your browser history is showing

tiffanydanica writes: For a lot of us our browser history is something we consider private, or at least not something we want to expose to every website we visit.Web2.0collage is showing just how easy it is (with code!)for sites to determine what sites you visit. When you visit the site it sniffs your browser history, and creates a collage of the (safe for work) sites that you visit. It is an interesting application of potentially scary technology (imagine a job application site using this to screen candidates). You can jump right into having your history sniffed if you so desire. While the collages are cool on their own merit, they also serve as an illustration of the privacy implications of browser history sniffing.
Privacy

Submission + - Generating Meta-collages from browser history

bobdole3k writes: With some simple javascript & scheme code (under the AGPL) its possible to sniff a users browser history. A new browser history sniffing site uses this to generate a collage of the sites you visit. Before you get worried, it uses a list of "web2.0" sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot/blogging habits). An interesting application of potentially scary technology. While the results by them selves are kind of interesting, the collage also serves as a cool illustration of the privacy concerns surrounding browser history sniffing.
Privacy

Submission + - Browser history sniffing illustrated

Anonymous Pants writes: A new open-source website, Web2.0 Collage, illustrates just how easy browser sniffing is. Once it's gotten a list of all the sites you visit it constructs a (somewhat creepy) collage graphically illustrating the websites you visit. Depending on your browser history the results can be nifty or creepy (fortunately it does use a filtered SFW list). While the results on it own are kind of interesting, it also serves as a cool way to illustrate the privacy concerns of browser history sniffing.
Security

Submission + - Website hijacks browser history & makes collag

itsamemario writes: With some basic javascript its possible to sniff a users browser history. A new browser history sniffing site uses this to generate a collage of the sites you visit. Before you get worried, it uses a list of "web2.0" sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot/blogging habits). An interesting application of potentially scary technology. For those wanting to skip the warning screen and go straight to the browser sniffing this should do the trick. While the results by them selves are kind of interesting, it also serves as a cool way to illustrate the privacy concerns of browser history sniffing.
Privacy

Submission + - Sniffing browser history for awareness & art

tdalek writes: web2.0collage.com uses browser history sniffing to determine what websites you visit and then creates a collage of them. While the collage is kind of nifty, it also graphically illustrates just how easy it is for people to sniff your browser history. Before you get too worried, it uses a white-list of SFW sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot habits). However, just because these people play nice is no guarantee that everyone else will. Other potential benign applications including customizing bookmark-lets, but the less than benign (say advertising or even hr site) implications or troublesome. An interesting application of potentially scary technology. For slashdotters not interested in warnings or explanations, you can jump straight to the browser history sniffing
The Internet

Submission + - Browser sniffing ninjas

tasteyf00dninja writes: web2.0collage.com uses browser history sniffing to determine what websites you visit and creates a collage of them. Before you get worried, it uses a list of "web2.0" sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot habbits). An interesting application of potentially scary technology. For those wanting to skip the warning & explanation screen and go straight to the browser history sniffing this should do the trick. While the results by them selves are kind of interesting, it also serves as a cool way to illustrate the privacy concerns of browser history sniffing.
Security

Submission + - The art of browser history sniffing

An anonymous reader writes: There is a new kid in town doing something a bit different. web2.0collage.com uses browser history sniffing to determine what websites you visit and creates a collage of them. Before you get worried, it uses a list of "web2.0" sites, so the collage will (probably) be appropriate (unless you don't want your colleagues knowing about your slashdot habbits). An interesting application of potentially scary technology. For those wanting to skip the warning screen and go straight to the browser sniffing this should do the trick. While the results by them selves are kind of interesting, it also serves as a cool way to illustrate the privacy concerns of browser history sniffing.
Security

Submission + - Yahoo! Zimbra Desktop vulnerable to MiTM

holdenkarau writes: "After patching the its plaintext authentication gaffe, Yahoo! Zimbra desktop has hit another stumbling block in the security road. Yahoo! Zimbra now uses the standard authentication method used by the rest of the Yahoo! Mail family. However, unlike other implementations where invalid SSL certificates will throw up plenty of warnings for the user, Yahoo! Zimbra Desktop is trivially vulnerable to a man-in-the-middle attack, as it simply transmits the usernames & passwords regardless of who's picked up on the other side. With all of the news about DNS vulnerabilities, this seems like exceptionally poor timing for a MiTM. For the time being you may wish to switch to using the Yahoo! webmail interface, until this bug gets fixed."

Statistics means never having to say you're certain.

Working...