![]() There are more and more innovations around the DNS technology, like DoH (DNS Over HTTPS) or DoT (DNS Over TLS) which can bypass the low level DNS service of the system, and then be ignored by the trackers manager.In order to solve potential issues, we provide the ability to whitelist any tracker individually for any application. Some trackers URL could be mandatory to use services.Advanced Privacy then logs each request to URL in the trackers list, and blocks them if the user required to block trackers in Advanced Privacy settings. ![]() Then, the low level DNS service of /e/OS sends each requested URL to Advanced Privacy. Adaway list is used to establish a list of domains to block, Exodus to identify those domains with a clean name. We build and maintain a list of all URLs used by trackers, merging Exodus list, Adaway list and a set of custom /e/OS rules. The DNS is the first step of an Internet request: it transforms the name of a service (for instance e.foundation), to its current real address on the internet (for instance: 157.90.154.178). Trackers blockers detect and block trackers when they perform DNS (Domain Name System) requests. ![]() Tracing a tracker means having a look at which applications (or system components) are connecting to which endpoints (when, how much data, which data, …). The collection and aggregation of these data are used to track users’ activity and behavior. A typical tracker consists of a software initiating requests from the device to send personal data to specific endpoints or APIs which collect connections’ metadata while providing a service.
0 Comments
Leave a Reply. |