Let’s set the scene: two mobiles (iOS and Android), desktop computer (Windows), iPad, laptop (Linux). What’s common? Mozilla Firefox of course!
Why? Because by synchronizing your open tabs, browser history, bookmarks and extensions across devices it doesn’t matter which device you’re using. Plus you use your Firefox account to access the Pocket link saving and promoting service. Pretty neat right?
It’s quite simple to setup Firefox Sync. All you need is a verified email address and a password. Every time you sync a new device you do have to confirm the action via click link in email sent you. And another thing.
Sync won’t let you login without the correct password. No brainier that for a service, right. But Sync goes better and the sign-in button won’t activate unless the password’s correct. No not magic but that would be cool. Just intelligent use of public and private keys.
Starting June 30, 2016 Indian news site have put in ad blocker mechanisms. So if you don’t want to be tracked you can’t access their news.
IMHO its no big loss as you can read most of the really important news on sites like the BBC and CNN :p
Or you can use an ad blocker like uBlock Origin on Mozilla Firefox like I do. The plugin is also available on Chrome and on Opera (are there any other noteworthy browsers?)
Of the many ad blockers (free and paid) available ‘Origin is the best. Its completely replaced Ghostery and Disconnect for me. Both add considerable resource overhead (no-no when using an older computer with under 2 GB RAM).
Update@July 12/16: Times of India web edidition isn’t being bypassed by the ad blocker 🙁 but if you click the stop button when the page loads you can read without ads.
And ‘Origin let’s you white list specific pages via Ctrl+Click. Not exact but it should tide you over until the news providers come to their senses.
POODLE is the latest Internet threat that targets our need to prefer secure (aka https) connections over unsecured (aka http) ones. POODLE (Padding Oracle On Downgraded Legacy Encryption) specifically targets a weakness in the SSL (Secure Sockets Layer) 3.0 protocol by exploiting a hard-coded flaw within SSL 3.0 to gain access to your data through browser cookies! (more…)