- Joined
- Oct 6, 2014
- Messages
- 1,424 (0.41/day)
System Name | octo1 |
---|---|
Processor | dual Xeon 2687W ES |
Motherboard | Supermicro |
Cooling | dual Noctua NH-D14 |
Memory | generic ECC reg |
Video Card(s) | 2 HD7950 |
Storage | generic |
Case | Rosewill Thor |
Not sure if this is the right forum for this so please move as needed.
Since 2012, Verizon has been injecting code into every network request you make from your phone that includes a unique identifier. Since this code is clearly viewable in the header, it is available to every site you go to. You cannot opt out of this tracking either. You're only option is use https or something like Tor or a VPN.
Story
Since 2012, Verizon has been injecting code into every network request you make from your phone that includes a unique identifier. Since this code is clearly viewable in the header, it is available to every site you go to. You cannot opt out of this tracking either. You're only option is use https or something like Tor or a VPN.
Story
Verizon’s network — only its wireless network, as far as we know — injects your unique ID into every HTTP request. This doesn’t sound that bad, until I tell you that HTTP headers are public. Every website you visit and every advertising network on that website (of which there could be dozens) can also use your X-UIDH. They don’t need permission from Verizon to do this — the header is right there, just waiting to be used. Even if you do run an add-on like Ghostery to block and delete tracking cookies, or enable Do Not Track, advertisers can still use the X-UIDH header to rebuild an accurate tracking cookie every time.
Now remember that the X-UIDH header may have been in place on Verizon Wireless’s network since 2012, and random third parties — that Verizon knows nothing about! — may have been building up a near-perfect history of your online behavior the entire time. The EFF reports that Verizon’s networking hardware even injects the X-UIDH header into the data stream of Verizon MVNOs, such as Straight Talk.