skip to main content
10.1145/2656434.2656446acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

A taxonomy of privacy-protecting tools to browse the world wide web

Published: 13 October 2014 Publication History

Abstract

There is a growing public concern regarding big data and intelligence surveillance on unsuspecting Internet users, and an increase in public conversation around what does privacy really mean in the digital realm. Although technologies have been developed to help generate public protect their privacy, average users found the tools complex and difficult to decipher. This research aims to weed through some of these complexities by reviewing 6 publicly recognized technologies promoted to help users protect their privacy while browsing the web. The scope will be broad in order to touch on the important aspects each technology including promises, privacy realities, technical construct, ease of use and drawbacks average users should be aware of before using.

References

[1]
Anjum, U. (2011, July 11). 10 Privacy Tools To Browse The Web Anonymously. Retrieved from http://www.smashingapps.com/2011/07/11/10-privacy-tools-to-browse-the-web-anonymously.html.
[2]
Baggili, I. (2009). GRADUATE SCHOOL (Doctoral dissertation, Purdue University).
[3]
Bai, X., Zhang, Y., & Niu, X. (2008, November). Traffic identification of tor and web-mix. In Intelligent Systems Design and Applications, 2008. ISDA'08. Eighth International Conference on (Vol. 1, pp. 548--551). IEEE.
[4]
Collins, H. (July 2013). Little known search engine that refuses to store data on users doubles web traffic amid NSA tapping scandal. MailOnline. Retrieved from http://www.dailymail.co.uk/news/article-2360059/DuckDuckGo-little-known-search-engine-refuses-store-data-users-doubles-web-traffic-amid-NSA-tapping-scandal.html.
[5]
Diaz, C. (2005). Anonymity and privacy in electronic services. Heverlee: Katholieke Universiteit Leuven. Faculteit Ingenieurswetenschappen.
[6]
DuckDuckGo. (2014). Home, about, Settings, and Privacy. Retrieved from https://duckduckgo.com.
[7]
DSL Reports. (2003). Guardster warning--NO PRIVACY AT ALL!!!. Retrieved from http://www.dslreports.com/forum/r8024528-Guardster-warning.NO-PRIVACY-AT-ALL-.
[8]
Electronic Frontier Foundation. (2014). Home, FAQ, and Deploying. Retrieved from https://www.eff.org/https-everywhere.
[9]
Froomkin, A. M. (1995). Flood control on the information ocean: Living with anonymity, digital cash, and distributed databases. JL & Com., 15, 395.
[10]
Google Images. (n.d. c). Mix Networks. https://www.google.com/search?q=proxies&source=lnms&tbm=isch&sa=X&ei=ZGJrU-SyNIGFyQHs4YHQCw&ved=0CAcQ_AUoAg&biw=1047&bih=633#q=Mix+Networks&tbm=isch.
[11]
Goth, G. (2011). Privacy Gets a New Round of Prominence. Internet Computing, IEEE, 15(1), 13--15.
[12]
Guardster. (2014). Home, about, Privacy, Terms, and etc. Retrieved from http://www.guardster.com.
[13]
Hideme. (2014). Home, email, IP, tips, faq, and disclaimer. Retrieved from http://www.hideme.be.
[14]
High Scalability. (January 2013). DuckDuckGo Architecture - 1 Million Deep Searches A Day And Growing. Retrieved from http://highscalability.com/blog/2013/1/28/duckduckgo-architecture-1-million-deep-searches-a-day-and-gr.html.
[15]
Internet Users. (n.d.) Retrieved April 2014 from http://www.internetlivestats.com/internet-users/.
[16]
Ixquick. (2014). Background, and traffic. Retrieved from https://ixquick.com/eng/company-background.html.
[17]
Kim, B., Laas, C., O'Gilvie, S., & Yip, A. (2001). Anonymity Tools for the Internet. Retrieved from http://www.swiss.ai.mit.edu/6.805/student-papers/spring01-papers/anonymity.pdf.
[18]
Kuiper, M. (n.d.). 20 Proxy sites to browse the net anonymously. Retrieved from http://www.marcofolio.net/tools/20_proxy_sites_to_browse_the_net_anonymously.html.
[19]
Loshin, P. (2013). Practical Anonymity: Hiding in Plain Sight Online. Newnes.
[20]
Love, D. (2013). How Totally Paranoid People Stay Safe Online. Business Insider. Retrieved from http://www.businessinsider.com/the-best-online-privacy-tools-2013--1?op=
[21]
Merriam-Webster. (n.d.). Dictionary - Privacy. Retrieved from http://www.merriam-webster.com/dictionary/privacy.
[22]
Pfitzman, A. & Kohntopp, M. (2001). Anonymity, Unobservability and Pseudonymity - A proposal for Terminology. In Hanns Federath (Ed), Designing Privacy Enhancing Technologies, Lecture Notes in Computer Scient, LNCS 2009, pp. 1--9, Springer-Verlag.
[23]
Rizzo, F. (2007). Security Advisory: Steganos Encrypted Safe NOT so safe. Retrieved from http://securityvulns.com/Qdocument686.html.
[24]
Rubenking, N. (2014, February 16). How to browse the web anonymously. ITProPortal. Retrieved from http://www.itproportal.com/2014/02/16/how-to-browse-the-web-anonymously/.
[25]
Steganos. (2014). Profile, online Shield, and etc. Retrieved from https://www.steganos.com/
[26]
Sweeney, L. (2002). k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05), 557--570.
[27]
Wolinsky, D. I., & Ford, B. (2013). WiNoN-Plugging the Leaky Boat of Web Anonymity. arXiv preprint arXiv:1312.3665.

Cited By

View all
  • (2023)Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VRProceedings of the 36th Annual ACM Symposium on User Interface Software and Technology10.1145/3586183.3606754(1-16)Online publication date: 29-Oct-2023

Index Terms

  1. A taxonomy of privacy-protecting tools to browse the world wide web

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RIIT '14: Proceedings of the 3rd annual conference on Research in information technology
    October 2014
    98 pages
    ISBN:9781450327114
    DOI:10.1145/2656434
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. anonymity
    2. privacy
    3. privacy-protecting
    4. pseudonymity
    5. web browsing

    Qualifiers

    • Research-article

    Conference

    SIGITE/RIIT'14
    Sponsor:
    SIGITE/RIIT'14: SIGITE/RIIT 2014
    October 15 - 18, 2014
    Georgia, Atlanta, USA

    Acceptance Rates

    RIIT '14 Paper Acceptance Rate 14 of 39 submissions, 36%;
    Overall Acceptance Rate 51 of 116 submissions, 44%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Going Incognito in the Metaverse: Achieving Theoretically Optimal Privacy-Usability Tradeoffs in VRProceedings of the 36th Annual ACM Symposium on User Interface Software and Technology10.1145/3586183.3606754(1-16)Online publication date: 29-Oct-2023

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media