How to Browse the Web Without Being Tracked

How to Browse the Web Without Being Tracked

Understanding Web Tracking: The Modern Baba Yaga

Web tracking, like the mythical Slovak Baba Yaga lurking at the edge of the digital forest, is ever-present yet elusive. Analytics scripts, cookies, fingerprinting, and IP logging are the enchanted objects of today’s witches—tools used by sites to follow your journey, harvest your data, and predict your next step. To navigate this world safely, you must equip yourself with the right talismans and rituals.


Browsers: Choosing Your Shield

Browser Default Tracking Protection Fingerprint Resistance Open Source Notes
Firefox Strong Moderate Yes Customizable, supports privacy extensions
Tor Browser Very strong High Yes Routes traffic via Tor network
Brave Strong Moderate Yes Blocks ads, trackers by default
Chrome Weak Low No Extensive tracking by Google
Ungoogled Chromium Moderate Moderate Yes Strips Google services

Recommendation:
For most, Tor Browser is the Čarovný klobúk (magic hat) of anonymity. Firefox with privacy extensions is a strong, more usable alternative.


Private Browsing Modes: Not a Silver Bullet

Private or incognito modes mainly prevent local history and cookies from being stored. They do not hide your IP or prevent fingerprinting.

Example:
Opening a private window in Firefox (Ctrl+Shift+P), then visiting https://amiunique.org/ will still reveal a unique browser fingerprint.


Essential Browser Extensions: Amulets Against Trackers

Must-Have Privacy Extensions

Extension Purpose Browser Support Download Link
uBlock Origin Blocks ads/trackers FF, Chrome https://github.com/gorhill/uBlock
Privacy Badger Blocks trackers dynamically FF, Chrome https://privacybadger.org/
HTTPS Everywhere* Forces HTTPS connections FF, Chrome https://www.eff.org/https-everywhere
Decentraleyes Local CDN resources FF, Chrome https://decentraleyes.org/
Cookie AutoDelete Auto-removes cookies FF, Chrome https://github.com/Cookie-AutoDelete/Cookie-AutoDelete
NoScript Script blocking FF https://noscript.net/

*Note: HTTPS Everywhere is now largely redundant as browsers enforce HTTPS by default.

Slovenská tradícia:
Much like hanging a sprig of rasca (caraway) over a cradle to ward off evil, these extensions act as protective charms for your browser.


Search Engines: Avoiding the Vodník’s Lure

Search Engine Logs IP? Tracks Queries? Hosted In Link
DuckDuckGo No No US https://duckduckgo.com/
Startpage No No Netherlands https://www.startpage.com/
Searx No No Varies https://searx.space/
Google Yes Yes US https://www.google.com/

Pro Tip:
Configure Firefox to use DuckDuckGo or your own Searx instance as the default search engine.


DNS Privacy: The Invisible Thread

Default DNS queries expose your browsing to your ISP and sometimes third parties. Switch to DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) for privacy.

Firefox: Enabling DNS-over-HTTPS

  1. Open about:preferences#general
  2. Scroll to “Network Settings” > “Settings…”
  3. Enable “Enable DNS over HTTPS”
  4. Choose a provider (Cloudflare, NextDNS, or custom)

CLI: Using dnscrypt-proxy (Linux)

sudo apt install dnscrypt-proxy
sudo systemctl enable --now dnscrypt-proxy

Resource: https://dnscrypt.info/


VPN and the Shadow Cloak

A VPN masks your IP address and encrypts your traffic—but your trust shifts from ISP to VPN provider. For maximal privacy, choose a no-logs provider based outside 14 Eyes jurisdictions, e.g., Mullvad or IVPN.

WireGuard Example (Linux)

sudo apt install wireguard
sudo wg-quick up wg0

(Configuration file from VPN provider required)


The Tor Network: Walking the Forest Paths Unseen

Tor provides strong anonymity by routing traffic through several volunteer-run nodes. Slower but effective against most tracking.

How to Use Tor Safely

  • Download only from https://www.torproject.org/
  • Avoid logging into personal accounts
  • Do not install additional browser extensions or plugins
  • Refrain from resizing the window (prevents fingerprinting)

Cultural note: In Slovak tales, those who stray from the path are often lost forever. In Tor, straying (e.g., installing addons) can break your anonymity.


Browser Fingerprinting: The Čert’s Mark

Sites combine subtle clues (fonts, screen size, OS, extensions) into a unique “fingerprint.” Defenses include:

  • Use Tor Browser, which standardizes most browser features
  • In Firefox: Set privacy.resistFingerprinting to true in about:config
  • Avoid uncommon extensions and customizations

Check Your Fingerprint:
Visit https://amiunique.org/ or https://coveryourtracks.eff.org/


Blocking Third-Party Cookies

Firefox

  • Go to about:preferences#privacy
  • Set Enhanced Tracking Protection to “Strict”

Chrome

  • Go to chrome://settings/cookies
  • Set “Block third-party cookies”

Script Blocking: The Modern “Závoj”

Scripts collect data and load trackers. Blocking them is like wearing a magical veil (závoj) in legend.

  • Use NoScript (Firefox) or uMatrix (archived but usable)
  • Only whitelist scripts essential for site functionality

Email Aliases and Disposable Addresses

Websites can track you via email addresses. Use:


Additional Rituals and Folk Wisdom

  • Clear Cookies and Site Data: Regularly purge browser data.
  • Block WebRTC: Prevents IP leaks (see WebRTC Control for Chrome)
  • Disable JavaScript where possible: Especially on unknown sites.
  • Avoid Social Logins: Don’t use “Log in with Facebook/Google.”

Summary Table: Layered Defenses

Threat Defense Slovak Folklore Analogy
IP Tracking VPN, Tor Magic cloak (plášť)
Cookies uBlock Origin, Cookie AutoDelete Garlic at the window
Fingerprinting Tor Browser, privacy.resistFingerprinting Mark of the čert
DNS leaks DNS-over-HTTPS, dnscrypt-proxy Secret forest path
Email tracking Aliases, ProtonMail Change of name by the stream
Scripts/Trackers NoScript, uBlock Origin Závoj (veil)
Search engine logging Searx, DuckDuckGo Avoiding the vodník

Resource Links

Želmíra Štefanovičová

Želmíra Štefanovičová

Senior Proxy Analyst

Želmíra Štefanovičová is a seasoned professional with over 30 years of experience in the technology sector. As a Senior Proxy Analyst at ProxyMist, Želmíra plays a pivotal role in curating and updating the company's diverse database of proxy servers. Her deep understanding of network protocols and cyber-security trends has made her an invaluable asset to the team. Želmíra's passion for technology began in her early twenties, and she has since dedicated her career to enhancing online privacy and security.

Comments (0)

There are no comments here yet, you can be the first!

Leave a Reply

Your email address will not be published. Required fields are marked *