Softpanorama

May the source be with you, but remember the KISS principle ;-)
Home Switchboard Unix Administration Red Hat TCP/IP Networks Neoliberalism Toxic Managers
(slightly skeptical) Educational society promoting "Back to basics" movement against IT overcomplexity and  bastardization of classic Unix

Google Embedded Tracking and Hidden Redirects in Search Results

News Privacy is Dead – Get Over It Recommended Links Big Uncle is Watching You How to collect and analyse your own Web activity metadata
Google Toolbar spyware Google secret redirects in search results Issues of security and trust in "cloud" env Search engines privacy Pitfalls of Google as a Search Engine
Nicholas Carr's "IT Does not Matter" Fallacy and "Everything in the Cloud" Utopia Cyberstalking   Humor Etc
 

Google practically owns search space. At least it used to own it before the current NSA-related backlash. But it has problems with tracking which links out of search results you chose to click. They are going to websites other then owned by Google so in no way it can retrieves information on which link you clicked. 

But look at the links to the following pages all extracted from Google search pages:

Do you see anything special? There is a clever trick in all of them. Google search results will appear in a normal link. However, behind the scenes, redirect for tracking is embedded and it can then "travel" to the site that used particular link in the webpage, like in cases above. This is a part of larger problem: continues tracking your activities on the Web by "cloud services" providers,.  See The SSD Project EFF Surveillance Self-Defense Project

There is actually several Trojans that reused this trick

Here is much more annoying example of such "hidden tracking" from Jason Ditz article White House Defends NSA ‘Social Mapping’ of Americans (September 30, 2013, Antiwar.com). The offending link with imbedded tracking is in red bold. The second link is "normal":

So when the New York Times  revealed over the weekend that the NSA has for the past 3 years been using its wholesale data collection from American citizens to construct elaborate maps of “social connections,” it was only a matter of time before the White House shrugged it off as perfectly legal and reasonable.

Although I was aware about this Google "feature" for a long time recently I swiped my site for such links and discovered almost a coupe of dozens "hidden redirects" that the site accidentally incorporates. For example:

./Security/intrusion_detection.shtml: <li><a target="_blank" href="http://www.google.com/url?sa=U&start=1&q=http://www.faqs.org/faqs/firewalls-faq/&e=42">Firewalls 
FAQ</a></li>
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=10&ved=0CC4QFjAJ&url=http%3A%2F%2Fwww.revsys.com%2Fwritings%2Fquicktips%2Fturn-off-selinux.html&ei=mw5uS--oCcXf8Qbsgfn1BQ&usg=AFQjCNHIU8hrcqoasRSjuVm6GCKUSkQaIQ&sig2=iraX_JIypRz5xdAsRxkanQ">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=2&ved=0CA0QFjAB&url=http%3A%2F%2Fsysdigg.blogspot.com%2F2008%2F01%2Fhow-to-disable-selinux-in-centos-5.html&ei=jRNuS-bWDZHp8Qaa_uz2BQ&usg=AFQjCNH_8U7u2GxeJnTaCEU9bkoWO-nDxQ&sig2=2tgyLdOFLed7x9Udl4SQDw">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=14&ved=0CBQQFjADOAo&url=http%3A%2F%2Fwww.cyberciti.biz%2Ffaq%2Fdisable-linux-firewall-under-centos-rhel-fedora%2F&ei=4BNuS9D8Bofd8QbsseX7BQ&usg=AFQjCNFIQDKdG931AbfM6Sp7B0ZPvsEsNA&sig2=QbeAMljbkhW3oqm9Kj1U_A">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=12&ved=0CAsQFjABOAo&url=http%3A%2F%2Ftweakandtune.blogspot.com%2F2009%2F03%2Fcentos-disable-selinux.html&ei=4BNuS9D8Bofd8QbsseX7BQ&usg=AFQjCNHf25XbLV8aYinQ_cmPaqXRIqZI_Q&sig2=1yBVR4mkVv5cIOqnqCdeFw">
./Security/Internet_privacy/google_tracking_links.shtml: <a href="http://www.google.com/url?sa=t&source=web&ct=res&cd=6&ved=0CCEQFjAF&url=http%3A%2F%2Fwww.electrictoolbox.com%2Fswitch-off-selinux-centos-5%2F&ei=jRNuS-bWDZHp8Qaa_uz2BQ&usg=AFQjCNGkADdZqCqn-PNHfqWyGkYq1W3Rqw&sig2=QI09yR-t92wrB0Jlv-GJng">
./About/buzz.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=nikolai bezroukov&source=web&cd=293&ved=0CDEQFjACOKIC&url=http://www.artur.pl/hack/ritlabs.ii.pl/dn/index.html&ei=ODmKT7v-DMuCrQfRsszEBA&usg=AFQjCNE5xSv5FCoQysbovbyYH2s20A4i5w">
./Access_control/Groups/user_private_groups.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=11&ved=0CCMQFjAAOAo&url=http://nixcraft.com/centos-rhel-fedora/17162-howto-disable-user-private-group-upg-scheme-enterprise-linux-5-x-6-x.html&ei=uIicTrn3H-Px0gGgjNnuBg&usg=AFQjCNHTVhJcX-0SWlEguzlBlAOrO2UbsQ">
./Access_control/Groups/user_private_groups.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=17&ved=0CFQQFjAGOAo&url=http://linux.about.com/cs/linux101/g/userprivategrou.htm&ei=uIicTrn3H-Px0gGgjNnuBg&usg=AFQjCNHcFAo_HDjykZb1q43aKnQ6q_Jryg">
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=4&ved=0CC0QFjAD&url=http://en.wikipedia.org/wiki/Setuid&ei=vBINTbb5DoOKlwffyrmpDA&usg=AFQjCNHzFhKLce6gFJC0a6K-EfENeDFTFg">setuid - Wikipedia, the free encyclopedia</a></li>
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CDsQFjAF&url=http://pas.spb.ru/net/puis/ch05_05.htm&ei=vBINTbb5DoOKlwffyrmpDA&usg=AFQjCNGhDqXcoR7oZKE1OulhxJEcgDWiYA">[Chapter 5] 5.5 SUID</a></li>
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=21&ved=0CBIQFjAAOBQ&url=http://docstore.mik.ua/orelly/unix3/upt/ch49_08.htm&ei=CxMNTZDBNcX7lwePzpWuDA&usg=AFQjCNF0t-mbCJHXZ_xPYI1L_NGXioXEAg">Care and Feeding of
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=32&ved=0CBcQFjABOB4&url=http://www.ibiblio.org/pub/linux/docs/LDP/linuxfocus/English/January1999/article77.html&ei=MRMNTbj2E4eglAf8n_G_Cw&usg=AFQjCNH3zxBO-0fbI40njJjM1BZaZu2A5A">UNIX Basics - File Access Permissions</a></li>
./Access_control/Permissions/suid_attribute.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=3&ved=0CCYQFjAC&url=http://tldp.org/HOWTO/Security-HOWTO/file-security.html&ei=mBMNTdqqLISglAfgupRJ&usg=AFQjCNHhERJgJE_PhweZibKPl_HA2AOxBg">Files and File system Security</a></li>
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=1&ved=0CCwQFjAA&url=http://en.wikipedia.org/wiki/AppArmor&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNF7PbWbXxGq-P0QSCNdbjkwGBdqPQ">
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=3&ved=0CDsQFjAC&url=https://help.ubuntu.com/community/AppArmor&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNEnwuHyjUIK6mjMTyRGhsfquS7uxA">
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=4&ved=0CEIQFjAD&url=http://wiki.apparmor.net/&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNEBuMgXuDAAPF3EVlvkM0RTtb3lqg">
./Access_control/umask.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=apparmor&source=web&cd=5&ved=0CEkQFjAE&url=http://www.suse.com/support/security/apparmor/&ei=GqkpT8axN9Lo2gWshtDoAg&usg=AFQjCNHRcoqkedIIsPhUkFlo4vIwSgLJQg">
./Admin/Administration_of_remote_datacenter/administration_of_remote_servers.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=administeration or remote linux servers by boris loza, phd, cissp&source=web&cd=1&sqi=2&ved=0CCQQFjAA&url=http://www.laptopmobilesecurity.com/papers/RemoteServers.pdf&ei=Mhw5UJzbLIXJrAel64CICw&usg=AFQjCNEJaVPoIc0NZiLLh12HGfL1WhFxbA">
./Admin/HP_operations_manager/Migration_from_tivoli_tec/index.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CDcQFjAF&url=http://documents.bmc.com/products/documents/38/98/83898/83898.pdf&ei=suP6TPHfOYT6lwf_qqCgDA&usg=AFQjCNHYcJIjO8OAqVLm7RaXMYtmGRo9WQ">
./Admin/HP_operations_manager/Migration_from_tivoli_tec/index.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=10&ved=0CFIQFjAJ&url=http://pirean.com/Downloads/secure/TEC_to_Netcool_WEB.pdf&ei=suP6TPHfOYT6lwf_qqCgDA&usg=AFQjCNGuD1gqVDt5t9jxSLKyTglkCC-hTw">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=8&ved=0CEcQFjAH&url=http://www.softpanorama.org/Admin/HP_operations_manager/Reference/opcmon.shtml&ei=xmleUNL9J8XirAeDiIDIDg&usg=AFQjCNERr8omPsuOHfe5C7JrtirKnpwbOQ">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=9&ved=0CEwQFjAI&url=http://www.slideshare.net/hpsoftwaresolutions/tips-and-tricks-for-hp-operations-manager-including-how-to-successfully-migrate-from-unix-to-linux&ei=xmleUNL9J8XirAeDiIDIDg&usg=AFQjCNFaqDLlPp2MDY8otzhzZQ43xoXwZw">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=16&ved=0CDkQFjAFOAo&url=http://blue-elephant-systems.com/fileadmin/Documents/Whitepapers/doc_whitepaper_ReleaseManagementProcess_1.0.pdf&ei=9mpeUOC3KIWPrgeNz4CoCg&usg=AFQjCNH8E87JrR31JBmafEn2UO0kSnuRAw">
./Admin/HP_operations_manager/Policies/measurement_threshold_policies.shtml: <a rel="nofollow" href="http://www.google.com/url?sa=t&rct=j&q=omu threshold monitor&source=web&cd=17&ved=0CD4QFjAGOAo&url=http://h30499.www3.hp.com/t5/Systems-Management-OpenView-OP/HPOM-Monitoring-Threshold/td-p/5246892&ei=9mpeUOC3KIWPrgeNz4CoCg&usg=AFQjCNFdoHS5BOvN8K7bd63Xrx_VwJhHkA">
./Admin/HP_operations_manager/agents.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=11&ved=0CEYQFjAK&url=http://www.slideshare.net/hpsoftwaresolutions/tips-and-tricks-for-hp-operations-manager-including-how-to-successfully-migrate-from-unix-to-linux&rct=j&q=HP HPOM agent troubleshooing&ei=G5O0TLyNKsSAlAfp7azlCQ&usg=AFQjCNFaqDLlPp2MDY8otzhzZQ43xoXwZw">
./Admin/Tivoli/ITM/index.shtml: in 2004 (<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBYQFjAA&url=http://www-03.ibm.com/press/us/en/pressrelease/7160.wss&ei=kMhQTI6nIsGAlAef6pG8CQ&usg=AFQjCNEa7Co7sgEhWkffFHxRUH9k3nvkKA">IBM).</a> ./Admin/Tivoli/index.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=2&ved=0CB0QhgIwAQ&url=http://en.wikipedia.org/wiki/Samuel_J._Palmisano&ei=RstQTOehJ8G78gbZ8ZzODQ&usg=AFQjCNG4sfcLpmCsHqzArTFNicSpTED8Bg">
./Admin/Tivoli/tivoli_alternatives.shtml:<a rel="nofollow" href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CDcQFjAF&url=http://documents.bmc.com/products/documents/38/98/83898/83898.pdf&ei=suP6TPHfOYT6lwf_qqCgDA&usg=AFQjCNHYcJIjO8OAqVLm7RaXMYtmGRo9WQ">
./Algorithms/Compilers/lexical_analysis.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=2&sqi=2&ved=0CC8QFjAB&url=http://dragonbook.stanford.edu/lecture-notes/Stanford-CS143/03-Lexical-Analysis.pdf&ei=Dv0YTbevD4L_8Abr5cyTDg&usg=AFQjCNGbpw3faB2XcO9AsmVU-ZrdLBTFQQ">
./Algorithms/Compilers/lexical_analysis.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=3&sqi=2&ved=0CDYQFjAC&url=http://www.cs.vassar.edu/~cs331/lectures/lexical-analysis.pdf&ei=Dv0YTbevD4L_8Abr5cyTDg&usg=AFQjCNGctbwIiaMZqrHlohY5ybwMvRJYyA">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=8&ved=0CE0QFjAH&url=http://blogs.msdn.com/b/ericwhite/archive/2010/07/30/building-a-simple-recursive-descent-parser.aspx&ei=m1YaTYGfIoG8lQePrszCCw&usg=AFQjCNHw9wvv96875D_GC3l0Ve5Lx5yYCQ">
./Algorithms/Compilers/recursive_descent_parsing.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBcQFjAA&url=http://en.wikipedia.org/wiki/Recursive_descent_parser&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNF3qsAXDUtjPOpLUUqpDD3uIL3bQA">
./Algorithms/Compilers/recursive_descent_parsing.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=1&ved=0CBkQFjAA&url=http://en.wikipedia.org/wiki/Terminal_and_nonterminal_symbols&ei=WFwaTaXgH8aqlAe93fzzCw&usg=AFQjCNHbNUbkSibyiY647ztpNwf9lxIEfw">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=2&ved=0CCMQFjAB&url=http://www.cs.uky.edu/~lewis/essays/compilers/rec-des.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNFNPS6GpKMM4Svz97w6Za1u13CDfQ">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=4&ved=0CDEQFjAD&url=http://www.codecodex.com/wiki/Recursive_descent_parsing&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNFwd4SlU8glerSwnAIZkx18Z73vAg">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=6&ved=0CD8QFjAF&url=http://www.cs.utsa.edu/~wagner/CS3723/rdparse/rdparser.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNHa_k1hXqMdxlprWFSKNCU7i-gT7A">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=5&ved=0CDgQFjAE&url=http://math.hws.edu/javanotes/c9/s5.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNEaVGtImupj1gq5ZWIdjyPLoro_Qw">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=7&ved=0CEYQFjAG&url=http://lambda.uta.edu/cse5317/notes/node14.html&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNGIrFtJp4AUhKmK8pYx1ED0aYf_MA">
./Algorithms/Compilers/recursive_descent_parsing.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=8&ved=0CE0QFjAH&url=http://blogs.msdn.com/b/ericwhite/archive/2010/07/30/building-a-simple-recursive-descent-parser.aspx&ei=WlYaTYKdO8WqlAeFte3sCw&usg=AFQjCNHw9wvv96875D_GC3l0Ve5Lx5yYCQ">
./Algorithms/Sorting/bubblesort.shtml:<a href="http://www.google.com/url?sa=t&source=web&cd=94&ved=0CCUQFjADOFo&url=http://warp.povusers.org/grrr/bubblesort_misconceptions.html&ei=mS2xTOeRL4OglAfY45mmBg&usg=AFQjCNHYFl1O-d1rCA95M8JIcVCJXyWfTg">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=12&ved=0CCQQFjABOAo&url=http://www.sph.umich.edu/csg/abecasis/class/2006/615.08.pdf&ei=zea5ToLhO4PJrAeonOjaBg&usg=AFQjCNHpmVFzHj2NL6TqIqrt1Mdn6bcDTQ">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=22&ved=0CCMQtwIwATgU&url=http://www.youtube.com/watch?v=-kh9oFK8R7s&ei=yO65TqaVDoLJrQfZ883hCA&usg=AFQjCNHCyVxC5z-Z-1jJwcP_bU-lmsa_vg">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=25&ved=0CDoQFjAEOBQ&url=http://www.learnerstv.com/video/Free-video-Lecture-2233-Computers.htm&ei=yO65TqaVDoLJrQfZ883hCA&usg=AFQjCNE5urPyd87S2Kv9JERB1hUGvrBs6Q">
./Algorithms/Sorting/quicksort.shtml: <a href="http://www.google.com/url?sa=t&rct=j&q=lecture quicksort&source=web&cd=12&ved=0CCQQFjABOAo&url=http://www.sph.umich.edu/csg/abecasis/class/2006/615.08.pdf&ei=zea5ToLhO4PJrAeonOjaBg&usg=AFQjCNHpmVFzHj2NL6TqIqrt1Mdn6bcDTQ">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=12&ved=0CBsQFjABOAo&url=http://www.dreamincode.net/forums/topic/103288-bit-tricks/&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNHr-NzGFqZZcgajiJy-7xEGS7W1Rg">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=11&ved=0CBIQFjAAOAo&url=http://ezinearticles.com/?String-Tricks---A-Bit-of-String-Magic-(Free-Magic-Trick)&id=990561&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNEqIGhHOcLQX4hmsx37q08GbwrjVg">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=14&ved=0CCkQFjADOAo&url=http://www.ugcs.caltech.edu/~wnoise/base2.html&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNEQhX7Dm5Xuy-TrXwxYUhCgSebj8Q">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=17&ved=0CD4QFjAGOAo&url=http://www.steike.com/code/bits/vertical-counter/&ei=hHoaTeWND8H_lge2wehP&usg=AFQjCNEZDEEBIoCv_DnQMJqWN_-U3Ht6ug">
./Algorithms/bit_tricks.shtml: <a href="http://www.google.com/url?sa=t&source=web&cd=27&ved=0CDoQFjAGOBQ&url=http://ctips.pbworks.com/w/page/7277581/Bit-Manipulation&ei=uHoaTaHrHYSdlgfvnJnJDA&usg=AFQjCNEfAiIv8g0h0wMjuYYnNpCssk16OQ">&nbsp;Bit ./Bookshelf/Classic/tmmm.shtml: <a target="_blank" href="http://www.google.com/url?sa=U&start=1&q=http://en.wikipedia.org/wiki/The_Mythical_Man-Month&e=747">
./Bookshelf/Classic/tmmm.shtml:<a target="_blank" href="http://www.google.com/url?sa=U&start=1&q=http://en.wikipedia.org/wiki/The_Mythical_Man-Month&e=747">

If you are using Firefox, you can protect yourself from this kind of tracking using one of the following two Firefox add-ons:

  1. Google/Yandex search link fix by by Wladimir Palant

    Google Search has the annoying habit of changing the result link when you click it. If you try to copy the link you get some gibberish instead of the actual link. This extension disables this behavior - on any Google domain, without having to configure anything. Simply install and enjoy!

  2. Remove Google Tracking 1.8:
    This addon will remove such embedded tracking when click a link in Google Search and open a link directly.

    Features:

    Remove tracking(redirect) Quickly(no contents rewrite) and Simple(rewrite tracking URL in HTTP request) on

    • Google Search
    • Google Custom Search (since version 1.3)
    • Google Images (since version 1.3)
    • Google Maps (since version 1.4)
    • Google News (since version 1.5)
    and also remove tracking from Javascript dynamic generated URL.

    Remove tracking is performed in the following four patterns.

    1. Left-click a link to open in that window.
    2. Right-click on a link to open in a new tab.
    3. Right-click on a link to open in a new window.
    4. Copy a link and paste it into the URL bar.

    And remove tracking supports normal HTTP request and secure HTTP request (https).
    For protect your privacy, I recommend you to use Google Search in secure HTTP request https://www.google.com

    Known Issues:

    Sometimes 'Left-click the link to open in that window' was failed.
    In my trouble shoot, Network monitor captured tracking removed url only.
    So I think Firfox failed to refresh window in some internal conditions.
    If firefox failed to refresh window, please use other patterns.
    In addition, this issue does not occur almost when using secure http request (https).

    Also "Remove Yahoo Tracking" is available.

  3. Remove google search redirects 1.1.0

    Google uses a redirection link to tracks your clicks, in order to analyze the stats and later optimize their search results. This addon simply removes that redirection and turns every search result in its original link, saving your time and giving you more security.

    Works on results accessed from http://google.com or https://google.com (and any country variation like google.es, google.co.uk and so on) and from the Firefox search box, works on regular results and Google Blogs, Google News, Google Recipes, Google Images, Google Videos and even using encrypted.google.com.

    It also cleans up all the links you copy & paste from Google search results pages. This is one is a feature most users are looking for and other similar addons don't have.

    Please give me feedback as much as you can and suggest features. I'll be maintaining and supporting this addon since it proved to be useful for the community. I'll be glad to hear from you.

You can also block Google Analytics, which is another backdoor using which Google tries to track your activities. See NO Google Analytics 0.5


Top Visited
Switchboard
Latest
Past week
Past month

NEWS CONTENTS

Old News ;-)

[Nov 05, 2013] How to prevent Google from tracking you How To by Dennis O'Reilly

January 30, 2012 | CNET

The Electronic Frontier Foundation offers the Panopticlick service that rates the anonymity of your browser. The test shows you the identifiable information provided by your browser and generates a numerical rating that indicates how easy it would be to identify you based solely on your browser's fingerprint.

According the the entropy theory explained by Peter Eckersley on the EFF's DeepLinks blog, 33 bits of entropy are sufficient to identify a person. According to Eckersley, knowing a person's birth date and month (not year) and ZIP code gives you 32 bits of entropy. Also knowing the person's gender (50/50, so one bit of entropy) gets you to the identifiable threshold of 33 bits.

When I ran Panopticlick's test on a Mac Mini, it reported 20.89 bits of identifiable information, which according to the entropy formula would be insufficient to identify me. But maybe I want the sites I frequent to know a little bit about me. As I explained in a post from last October, personal information is the currency of the Web.

... ... ...

Free add-on for Firefox and Google Chrome targets tracking cookies

Several free browser extensions help you identify and block the companies that are tracking you on the Web. For example, Ghostery (available in versions for Firefox and Chrome) adds an icon to your browser toolbar showing the number of trackers on the current page. Click the icon to see a list of the trackers and view options for blocking or white-listing specific ones.

The free Disconnect extension (also available for Facebook and Chrome) takes a more direct approach to wiping your Web tracks. Disconnect blocks tracking by Google, Facebook, Twitter, Yahoo, and Digg. It also has an option for depersonalizing searches.

As with Ghostery, Disconnect places an icon in the browser toolbar that shows the number of elements it has blocked on the current page. Click the icon to open a window showing the number of trackers blocked for each service. To unblock tracking for one of the services, click its entry. (Note that I tested Disconnect only with Google; also, blocking of international Google domains is not yet available, according to Disconnect's developers.)

When I tested Disconnect, I had to sign in to Gmail, Google Docs, and other Google services every time I returned to or refreshed one of those pages, which is understandable considering that blocking the cookie prevents Google from keeping you signed in. Otherwise I was able to use Google services without a problem, including search, viewing and sending Gmail, and accessing, creating, uploading, and downloading Google Docs files.

While people are rightly concerned about who is watching and recording their Web activities, at least Google makes it possible to use the company's services without being too forthcoming with your personal information. ISPs and other Web services do as much tracking as Google--or more--but garner far fewer headlines. For a detailed look at the state of privacy in the digital world, read about the Electronic Frontier Foundation's Surveillance Self-Defense project.

After all, the true threat to privacy is from the trackers we don't know about, and who aren't household names.

[Nov 05, 2013] How to Stop Google, Yahoo & Bing from Tracking Your Clicks

Whenever you click a link in Google Search, your click is redirected through a secret URL. If the site you're going to is http://www.cybernetnews.com/, Google will do a secret redirect through a URL that looks similar to http://www.google.com/url?url=http://www.cybernetnews.com/. In some cases, you can reveal the secret redirect by right-clicking on a linked search result. If that doesn't work, your last resort is an HTTP sniffer.

There are several Firefox add-ons that claim to get rid of Google Search's click tracking. CustomizeGoogle is one of them. Among other tweaks, it promises to remove click tracking and disable Google Analytics cookies. If you just want the anti-tracking feature without the bells and whistles, there's a Greasemonkey script you can download called Google Tracking B-Gone. To use Greasemonkey scripts, you need to install the Greasemonkey add-on for Firefox. Also, if you use an international version of Google such as google.co.uk, you have to change the script's URL range from http://*.google.com/* to http://*.google.*/* to ensure that the script is allowed to operate on your local Google site.

[Nov 05, 2013] undirect - Chrome extension that removes google redirect search result

Google Project Hosting
When searching using google, the result links don't go directly to the site - they first send the user to an interim "redirecting" page, which they use to keep track of user's search results.

Usually, this isn't a problem, but sometimes when you're on a slow connection, or want to send friends a link straight from the search results, this just gets in the way.

Undirect is a simple chrome extension that removes this tracking and redirection from google search results.

Works for all google domains across all countries, and is very light-weight.

Undirect @ Chrome Web Store

Install latest version

How To Disable Google Search Redirects By

April 22, 2011 | Ghacks

Many websites look up the IP address that you are connecting with, or other browser header information, to redirect you automatically to a language specific website. While those systems usually get it right, they are annoying for users who do not want to be redirected to a country specific domain name or different language version.

The search engine Google is for instance redirecting first time users automatically to a localized search engine when they open google.com but do not have an IP address that resolves to the US. You can click on the go to google.com link at the bottom to force the switch but this is saved in a cookie which means that you will be redirected again if you delete the cookie or if it expires. Some users do not like to be patronized.

Back in 2008 I posted a solution to the question Why is Google.com redirecting me to another Google domain?. The solution back then was to use a special url to load google.com without being redirect to a country specific search domain.

google.com in english

The url http://www.google.com/webhp still works as intended. Roman send me an email recently that described a second option which blocks the redirect completely and loads the standard Google search engine homepage.

If you load http://www.google.com/ncr you tell Google that you do not want to be redirected. The NCR supposedly stands for No Country Redirect.

Now, if you bookmark that domain name you will always end up on the default google.com search page. Google will automatically save a cookie on your computer that prevents redirects to other localized Google search engine domains. You can theoretically open google.com directly after this point as long as you keep the cookie on the system. If you want to avoid troubles at all, you may want to always use the ncr address.

It is not an ideal solution, considering that you cannot seem to use http://www.google.com/ncr as your browser's search engine for instance, but it works reasonably well if you bookmark the url and use that bookmark to open the Google search website.

Tutorial stop Google redirecting to local search results Neorelic [The Blog] by Patrick Jones

November 23, 2011 | blog.neorelic.com.au

Recently, I've been hearing a few complaints about Google automatically redirecting to location-specific search results. Most of the time, this is fine. However, sometimes you might find this to be too restrictive and want to expand your search outside of your own country.

Here are a couple of quick tips on how to get around Google's automatic redirection.

>Use google.com/ncr instead of google.com

How to Stop Google from recording your Search habits

AOL, the fourth most popular search engine, recently released search queries of 650,000 AOL subscribers on the Internet. Though AOL now says that it was a mistake and quickly removed the search data from their website, mirror copies of AOL search terms continue to be available across the web.

It is a universal truth that all search engines, including Yahoo, Google and MSN, retain search data of their users which can easily give a clue about the person's identity and a glimpse into his mind and online activity.

Though it is highly unlikely that Google users will ever come across this "AOL Data Spill" like embarrassing situation, the possibility cannot be ruled out completely especially after Eric Schmidt's remark that ".. this sort of thing would not happen at Google although you can never say never."

If you are worried that some day Google, by mistake, might disclose your private search terms into public internet domain, try some of the following suggestion that may fool the search engine or give it a hard time recognizing you.

The background is that when you perform a search on Google, the site search logs keep a record of your computer IP address, cookie ID and the search query terms. Google may also track your clicks on the search results by rewriting the destination URL. So we will look at possible ways to manipulate each of this information:

1. Disallow Google to Store Cookies - The important thing is that it doesn't suffice blocking cookies from just google.com domain, you must also block cookies from google site in your country.

For example, in India, one would block google.com and google.co.in - This is because Google redirects you to your local country page when you type in google.com in the browser address bar.

To block cookies, open the Cookie blocking dialog in your browser, type the site url and click disallow or block.

IE: Click Tools->Internet Options->Privacy->Sites
Firefox: Click Tool->Options->Privacy->Cookies->Exceptions

Remember that Google Personalized Search History won't work after you disable cookies from Google.com. Also, you may have to type the user name and password of other Google services like each time you have to login since cookies are disabled and you won't be automatically logged in.

2. Use Scandoo - Scandoo is a wonderful wrapper written around search engines that warns you of malicious websites in search results. Now the good part is that Scandoo can help you search Google, Yahoo or MSN without disclosing your actual geographic location (or IP Address) to the search engine.

Scandoo interace remains invisible to the end user and one would feel that he is searching via Google itself. [Scandoo Google, Scandoo IE Toolbar]

3. Download HideMyIp software - Your IP address is one big link between your search queries. You would be lucky if your ISP provides you a dynamic IP address that changes frequently but if you are stuck with a static IP, you can still hide it with Hide MyIP address software.

HideMyIP conceals your real IP address and shows a fake IP with a hostname to the sites that you visit. You can set Hide-My-IP to change your IP address every minute. [Download Hide-My-IP.com]

4. Download CustomizeGoogle for Firefox - If you Google using Firefox, this is a highly recommended extension that completely enhances your Googling experience. It can help remove Googel Ads, anonymize your Google userid, remove click tracking or filter google search results. [Install CutomizeGoogle]

5. Block cookies from Yahoo, Google and MSN. Then use Dogpile.com for searching these three search engines simultaneously. [Dogpile Search]

6. Block Google from Tracking Your Clicks

7. Don't use Google or Yahoo to search the web as they will store your entire trail of activity on their servers. Try Clusty.com or Ixquick.com which do not save users search data. Clusty is a meta search engine based on Vivisimo clustered search - It queries several top search engines, combines the results, and generates an ordered list based on comparative ranking.

8. Finally, you can try Scroogle Google Scraper, a search wrapper around Google (and yahoo) search that lets you anonymously search Google and promises not maintaining your search query terms. [Google Scroogle]

By typing "/ncr" at the end of the URL, this indicates that you don't want to be automatically redirected to your localised version of Google. This also works if you want to specifically direct your browser to any other localised version of Google from around the world. For example:

Recommended Links

Google matched content

Softpanorama Recommended

Top articles

Sites

Top articles

Sites

Automatic redirection to location-specific serach results



Etc

Society

Groupthink : Two Party System as Polyarchy : Corruption of Regulators : Bureaucracies : Understanding Micromanagers and Control Freaks : Toxic Managers :   Harvard Mafia : Diplomatic Communication : Surviving a Bad Performance Review : Insufficient Retirement Funds as Immanent Problem of Neoliberal Regime : PseudoScience : Who Rules America : Neoliberalism  : The Iron Law of Oligarchy : Libertarian Philosophy

Quotes

War and Peace : Skeptical Finance : John Kenneth Galbraith :Talleyrand : Oscar Wilde : Otto Von Bismarck : Keynes : George Carlin : Skeptics : Propaganda  : SE quotes : Language Design and Programming Quotes : Random IT-related quotesSomerset Maugham : Marcus Aurelius : Kurt Vonnegut : Eric Hoffer : Winston Churchill : Napoleon Bonaparte : Ambrose BierceBernard Shaw : Mark Twain Quotes

Bulletin:

Vol 25, No.12 (December, 2013) Rational Fools vs. Efficient Crooks The efficient markets hypothesis : Political Skeptic Bulletin, 2013 : Unemployment Bulletin, 2010 :  Vol 23, No.10 (October, 2011) An observation about corporate security departments : Slightly Skeptical Euromaydan Chronicles, June 2014 : Greenspan legacy bulletin, 2008 : Vol 25, No.10 (October, 2013) Cryptolocker Trojan (Win32/Crilock.A) : Vol 25, No.08 (August, 2013) Cloud providers as intelligence collection hubs : Financial Humor Bulletin, 2010 : Inequality Bulletin, 2009 : Financial Humor Bulletin, 2008 : Copyleft Problems Bulletin, 2004 : Financial Humor Bulletin, 2011 : Energy Bulletin, 2010 : Malware Protection Bulletin, 2010 : Vol 26, No.1 (January, 2013) Object-Oriented Cult : Political Skeptic Bulletin, 2011 : Vol 23, No.11 (November, 2011) Softpanorama classification of sysadmin horror stories : Vol 25, No.05 (May, 2013) Corporate bullshit as a communication method  : Vol 25, No.06 (June, 2013) A Note on the Relationship of Brooks Law and Conway Law

History:

Fifty glorious years (1950-2000): the triumph of the US computer engineering : Donald Knuth : TAoCP and its Influence of Computer Science : Richard Stallman : Linus Torvalds  : Larry Wall  : John K. Ousterhout : CTSS : Multix OS Unix History : Unix shell history : VI editor : History of pipes concept : Solaris : MS DOSProgramming Languages History : PL/1 : Simula 67 : C : History of GCC developmentScripting Languages : Perl history   : OS History : Mail : DNS : SSH : CPU Instruction Sets : SPARC systems 1987-2006 : Norton Commander : Norton Utilities : Norton Ghost : Frontpage history : Malware Defense History : GNU Screen : OSS early history

Classic books:

The Peter Principle : Parkinson Law : 1984 : The Mythical Man-MonthHow to Solve It by George Polya : The Art of Computer Programming : The Elements of Programming Style : The Unix Hater’s Handbook : The Jargon file : The True Believer : Programming Pearls : The Good Soldier Svejk : The Power Elite

Most popular humor pages:

Manifest of the Softpanorama IT Slacker Society : Ten Commandments of the IT Slackers Society : Computer Humor Collection : BSD Logo Story : The Cuckoo's Egg : IT Slang : C++ Humor : ARE YOU A BBS ADDICT? : The Perl Purity Test : Object oriented programmers of all nations : Financial Humor : Financial Humor Bulletin, 2008 : Financial Humor Bulletin, 2010 : The Most Comprehensive Collection of Editor-related Humor : Programming Language Humor : Goldman Sachs related humor : Greenspan humor : C Humor : Scripting Humor : Real Programmers Humor : Web Humor : GPL-related Humor : OFM Humor : Politically Incorrect Humor : IDS Humor : "Linux Sucks" Humor : Russian Musical Humor : Best Russian Programmer Humor : Microsoft plans to buy Catholic Church : Richard Stallman Related Humor : Admin Humor : Perl-related Humor : Linus Torvalds Related humor : PseudoScience Related Humor : Networking Humor : Shell Humor : Financial Humor Bulletin, 2011 : Financial Humor Bulletin, 2012 : Financial Humor Bulletin, 2013 : Java Humor : Software Engineering Humor : Sun Solaris Related Humor : Education Humor : IBM Humor : Assembler-related Humor : VIM Humor : Computer Viruses Humor : Bright tomorrow is rescheduled to a day after tomorrow : Classic Computer Humor

The Last but not Least Technology is dominated by two types of people: those who understand what they do not manage and those who manage what they do not understand ~Archibald Putt. Ph.D


Copyright © 1996-2021 by Softpanorama Society. www.softpanorama.org was initially created as a service to the (now defunct) UN Sustainable Development Networking Programme (SDNP) without any remuneration. This document is an industrial compilation designed and created exclusively for educational use and is distributed under the Softpanorama Content License. Original materials copyright belong to respective owners. Quotes are made for educational purposes only in compliance with the fair use doctrine.

FAIR USE NOTICE This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available to advance understanding of computer science, IT technology, economic, scientific, and social issues. We believe this constitutes a 'fair use' of any such copyrighted material as provided by section 107 of the US Copyright Law according to which such material can be distributed without profit exclusively for research and educational purposes.

This is a Spartan WHYFF (We Help You For Free) site written by people for whom English is not a native language. Grammar and spelling errors should be expected. The site contain some broken links as it develops like a living tree...

You can use PayPal to to buy a cup of coffee for authors of this site

Disclaimer:

The statements, views and opinions presented on this web page are those of the author (or referenced source) and are not endorsed by, nor do they necessarily reflect, the opinions of the Softpanorama society. We do not warrant the correctness of the information provided or its fitness for any purpose. The site uses AdSense so you need to be aware of Google privacy policy. You you do not want to be tracked by Google please disable Javascript for this site. This site is perfectly usable without Javascript.

Last modified: March, 12, 2019