this post was submitted on 29 Oct 2024
3 points (80.0% liked)
Text-Based User Interfaces (TUI; CLI)
62 readers
16 users here now
Forum for advanced users who grok the power of text-based apps, the advantage of tmux/GNU screen, the keyboard and who often find the mouse a hinderance to a fast workflow. A text-based UI is also a decent escape from enshitified resources.
This forum broadly covers tools, hacks, and advocacy of text-based environments.
Slightly marginally kind of related:
founded 2 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Indeed, but what what was logged? Suppose the tracker pixel is something like:
https://www.website.com/uniqueDirForTracking/b1946ac92492d2347c6235b4d2611184.gif
and I visit that URL from Tor. The server at
www.website.com
can easily log the (useless) Tor IP and timestamp, but does it log theb1946ac92492d2347c6235b4d2611184
? I’m not an expert on this which is why I am asking, but with my rough understanding I suspect that transaction might break down to multiple steps:www.website.com
hostIf the negotiation is blocked by the firewall, does the server ever even see the request for
b1946ac92492d2347c6235b4d2611184.gif
?Yes, the server gets the request for
/uniqueForTracking/b19...184.gif
, which could be logged.That’s interesting. It sounds like browsers could be designed smarter. I get “403 Forbidden” chronically in the normal course of web browsing. In principle if a server is going to refuse to serve me, then I want to give the server as little as possible. Shouldn’t Tor browser attempt to reach the landing page of the host first just to check the headers for a 403, then if no 403 proceed to the full URL?
#dataMinimization
Its not a browser thing, its HTTP. The return codes are specific to the request, not the server.
GET example.com
could validly return 403, whileGET example.com/tracking123.gif
returns 200 or anything else.