User Tools

Site Tools


secure_browsing

This is an old revision of the document!


Securing your browsing

Key points:

Beware of "lookalike" domain names

An obvious example: you want google.com, but the site is using g00gle.com — visually similar. But you might spot it — especially if you are not expecting Google to use zeros as “o”s in their URLs.

What about a URL which is believable (e.g. Google-email.com), but actually nothing to do with the company in question?

Other similar approaches — trying to make the URL so long that you cannot see it all in your address bar, and the bit you can see looks right (e.g. Google.com.fehfw8fey98ffrf1gwffgeqt473guyfqgaifafrf67ct7821fft4yf4t1fu14dtd15fqgyurogftyr3go,com

You might not spot that the bit after the .com should be a forward slash, and not a full stop.

(In this case, Google controls both g00gle.com and google-email.com — probably for the very reason of trying to lessen the risk to users.) But these all rely fooling you with a similar, but not correct, URL and, with some additional scrutiny and care, you should be able to keep yourself safe from these type of attacks.

Use a trusted DNS server

Unfortunately, even if you type the right URL into your browser, there is no guarantee that you are connecting to the correct site.

That's because:

  • the system which handles the conversion of domain names to IP addresses — the domain name system — is fundamentally insecure. While some sites have adopted techniques to mitigate this, you are unlikely to know which sites have done this.
  • networks often try to be helpful and offer you a DNS service — but the outcome is that you are using the Internet equivalent of their own personal phone book, and you have no idea if they've replaced some of the phone numbers with fake ones.

The net result is that you could type the right URL into your browser, but still be directed to a fake site.

Make sure that you are using a DNS server which you trust — although you may find some networks block DNS traffic other than to their own DNS server.

To mitigate this, you can:

  • use a VPN, as long as you make sure that your DNS look-ups go over the VPN tunnel. In doing this, you will be using your own choice of DNS server, rather than the DNS server offered by the network you are connected to.
  • use DNS-over-https if your browser supports it. This only protects the browsing you do using that browser.
  • use Tor.

Check for a padlock, but it doesn't mean you're connecting to the right site

Before you send anything sensitive to a website (such as login credentials, or anything personal or confidential), check that there is a padlock symbol in your browser's URL bar.

If you see a padlock, it means that the connection between your browser and the web server is encrypted. Although people spying on your traffic can tell you are connecting to that website, and can tell the volume of data you are sending, they cannot see the content of those data.

The padlock only means that the connection is encrypted. It is not a guarantee that the site is the right site, rather than one being operated by a fraudster. However, it makes this relatively unlikely.

It is also no guarantee that the recipients of your data will not abuse it.

As a rule of thumb, be very wary giving personal data to a site which is not showing a padlock. But don’t rely on a padlock as a sign that everything is fine.

Use two-factor authentication wherever you can

To protect against this type of attack, you might consider something called two-factor authentication:. I’ll talk about this in the recording about passwords but the gist is that, as well as sending a username and password, both of which are things which you know, you are also sending a one-time token, only valid for that one login, which is generated by something which you have — it could be a phone, or a specific hardware device.

It would not stop the rogue site from getting your username and password but it should make it harder, if not impossible, for them to log in pretending to be you, as they would not have the ability to generate that one time token.

Use "private browsing mode", but be aware of its limitations

There’s a strong chance that your browser offers a “private browsing” mode.

This was commonly discussed as a mode which you were supposed to use when buying a present for a loved one, so that they would not find traces of your secretive gift habits if they happened to use your computer. In reality, it’s pretty much universally known as “porn mode”, for much the same reason.

If you do not want your browser to retain a record of what sites you have visited, private browsing mode is reasonable way of doing this — it saves you having to clear your history, cookies, cache etc manually.

Private browsing does not stop:

  • the sites you visit from logging information about you, such as your IP address.
  • your network provider from seeing (and potentially recording) your traffic.

So it can be a useful tool if you do not want your computer to retain information about your browsing, but be aware that it does not hide your browsing from your Internet provider.

If you want to do that, then Tor, especially via Tor Browser, is a better option.

Cross-site and repeat-visit tracking

Loading images from remote servers

Every time you connect to a site, you are sending information to it — your IP address, and some information about your browser configuration. Where a page hosts images from multiple other sites, you are sending your information to all of those sites.

So every time you load a page containing a Facebook element, your computer is talking to Facebook. Easy to build up a picture of your activity over time.

Imagine every time you go into a shop, or visit a friend, or read a news story, you are ringing someone and saying “hi! I’m over here now!”. That is basically what is happening.

Technically, it does not matter if you are logged in or not — but staying logged in to Facebook, Twitter, LinkedIn etc can only help matters.

Clearing your cookies and cache

Sites may store information on your computer, in the form of cookies.

You can delete these (or refuse to receive them in the first place) through your browser settings.

Blocking all cookies might make some sites work poorly — if a cookie is used for keeping your login session active, for example, or maintaining the content of your shopping basket before you check out, disability cookies could result in a really poor user experience or failed transactions.

Removing cookies will limit the information that a site can collect on you, but will mean you need to keep logging in.

“Supercookies”

Information injected into your browsing by your ISP. VPN may assist — assuming that your VPN provider is not modifying your traffic too…

Tracking without cookies

Even without cookies, still possible to track you:

Combination of IP address and browser-specific information. EFF’s “panopticlick” tool: https://panopticlick.eff.org

Looks at the variety of information available from your browser, and suggests how many other browsers will look indistinguishable from yours. When I tested my browser, it showed it would be pretty easy to identify it: 1 in 100,000 browsers.

Blocking ads

A slightly controversial topic is that of blocking ads.

This entails running software either on your phone or laptop, or else on the network itself, which attempts to detect requests your devices make for adverts embedded in webpages, and blocking them. The software to do this is readily and freely available.

The reason I say it is controversial is that, for all its sins, online advertising, especially targeted advertising, funds as lot of sites, and blocking ads may have an adverse impact of their viability. That’s increasingly why, if you have an ad blocker running, you see “ad walls” pop up on the page you are trying to visit, telling you to drop you ad blocker or else leave.

For me, that’s probably a good enough sign to leave, but others may feel differently.

Generally, irritating though they are, particularly when they block the flow of text on a page, it is not the advertisements themselves which are objectionable.

More usually, it is the fact that the advertisements are targeted. And, to achieve this, data about the sites you are visiting, and about your computer and software, and sent to third parties who run advertising networks, to enable them to try to shove you the advert which they think will get the best reaction from you.

You might be surprised just how many people are tracking you on your favourite websites — tools such as Ad Block Plus and Ghostery, which you add in to your browser, can help you see just how much is going on. Unfortunately, there is no common way of accepting the advertising without the tracking, so your option is pretty much accept both or block both.

secure_browsing.1564939416.txt.gz · Last modified: 2021/07/06 09:26 (external edit)