Categories
browsing browsing history cookies data aggregators data collectors google internet internet provider personal data personal information privacy search surfing track virus web your device

Four Points in the “loop” When You Browse the Web

There are only four points in the communications “loop” between your device and the visited website when you browse the Web.

  1. Your device. Whether it’s a PC, laptop, cell phone or TV, this is usually the most valuable part of the cycle, because devices are manufactured with unique identifiers, and typically store A LOT of personal information on themselves and users add even more.
  2. The browser. Chances are your browser came with the device, or you very easily downloaded one, AND it’s free to use. All these browsers install cookies and execute code on your device from the websites you visit.
  3. The Internet Provider. You need an Internet connection to surf the Web. Most of the time it’s your local provider (home or cellular), or you may use a WiFi connection (hotel, airport etc.) With that internet connection (which has an unique identifier) you then have a communication loop between your device and the desired website.
  4. The website. When visiting a website, your device and browser shake hands with the website (which is hosted on another computer). Every single website on the internet has a unique identifier assigned to it. So when you click a link or type a URL, the browser is translates that action to the unique identifier belonging to the computer which hosts the page or website requested.

For further information: When you use a VPN (Virtual Private Network) with a browser, you’re adding another device point in addition to the many devices making the communications loop between your device and the website. VPNs just change what devices are used on that communication loop. This may hide your true IP address from the website but it does nothing more. Consequently, a VPN is within Point 3 above and affords no privacy or protection on Points 1, 2, or 4.

ALL of these four points must be made private and secure in any good browsing solution. Read on.

0 0 vote
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments